VuXML ID | Description |
c676bb1b-e3f8-11ed-b37b-901b0e9408dc | element-web -- matrix-react-sdk vulnerable to HTML injection in search results via plaintext message highlighting
Matrix developers report:
matrix-react-sdk is a react-based SDK for inserting a Matrix chat/VoIP
client into a web page. Prior to version 3.71.0, plain text messages
containing HTML tags are rendered as HTML in the search results.
To exploit this, an attacker needs to trick a user into searching
for a specific message containing an HTML injection payload. No
cross-site scripting attack is possible due to the hardcoded content
security policy. Version 3.71.0 of the SDK patches over the issue.
As a workaround, restarting the client will clear the HTML injection.
Discovery 2023-04-25 Entry 2023-04-26 element-web
< 1.11.30
CVE-2023-30609
https://github.com/advisories/GHSA-xv83-x443-7rmw
|
e4d93d07-297a-11ed-95f8-901b0e9408dc | Matrix clients -- several vulnerabilities
Matrix developers report:
The vulnerabilities give an adversary who you share a
room with the ability to carry out a denial-of-service
attack against the affected clients, making it not show all
of a user's rooms or spaces and/or causing minor temporary
corruption.
Discovery 2022-08-31 Entry 2022-08-31 cinny
< 2.1.3
element-web
< 1.11.4
CVE-2022-36059
CVE-2022-36060
https://matrix.org/blog/2022/08/31/security-releases-matrix-js-sdk-19-4-0-and-matrix-react-sdk-3-53-0
|
5b0ae405-cdc7-11ed-bb39-901b0e9408dc | Matrix clients -- Prototype pollution in matrix-js-sdk
Matrix developers report:
Today we are issuing security releases of matrix-js-sdk and matrix-react-sdk
to patch a pair of High severity vulnerabilities (CVE-2023-28427 /
GHSA-mwq8-fjpf-c2gr for matrix-js-sdk and CVE-2023-28103 / GHSA-6g43-88cp-w5gv
for matrix-react-sdk).
The issues involve prototype pollution via events containing special strings
in key locations, which can temporarily disrupt normal functioning of matrix-js-sdk
and matrix-react-sdk, potentially impacting the consumer's ability to process data
safely.
Discovery 2023-03-28 Entry 2023-03-29 element-web
< 1.11.26
cinny
le 2.2.4
CVE-2023-28103
CVE-2023-28427
https://matrix.org/blog/2023/03/28/security-releases-matrix-js-sdk-24-0-0-and-matrix-react-sdk-3-69-0
|
0dcf68fa-5c31-11ec-875e-901b0e9408dc | Matrix clients -- several vulnerabilities
Matrix developers report:
Today we are releasing security updates to libolm, matrix-js-sdk,
and several clients including Element Web / Desktop. Users are
encouraged to upgrade as soon as possible.
These releases mitigate a buffer overflow in olm_session_describe,
a libolm debugging function used by matrix-js-sdk in its end-to-end
encryption (E2EE) implementation. If you rely on matrix-js-sdk for
E2EE, you are affected.
Discovery 2021-12-03 Entry 2021-12-13 cinny
< 1.6.0
element-web
< 1.9.7
https://matrix.org/blog/2021/12/13/disclosure-buffer-overflow-in-libolm-and-matrix-js-sdk
|
cb902a77-3f43-11ed-9402-901b0e9408dc | Matrix clients -- several vulnerabilities
Matrix developers report:
Two critical severity vulnerabilities in end-to-end encryption were
found in the SDKs which power Element, Beeper, Cinny, SchildiChat,
Circuli, Synod.im and any other clients based on matrix-js-sdk,
matrix-ios-sdk or matrix-android-sdk2.
Discovery 2022-09-23 Entry 2022-09-28 cinny
< 2.2.1
element-web
< 1.11.7
CVE-2022-39249
CVE-2022-39250
CVE-2022-39251
CVE-2022-39236
https://matrix.org/blog/2022/09/28/upgrade-now-to-address-encryption-vulns-in-matrix-sdks-and-clients
|
93eb0e48-14ba-11ec-875e-901b0e9408dc | Matrix clients -- several vulnerabilities
Matrix developers report:
Today we are disclosing a critical security issue affecting
multiple Matrix clients and libraries including Element
(Web/Desktop/Android), FluffyChat, Nheko, Cinny, and SchildiChat.
Specifically, in certain circumstances it may be possible to
trick vulnerable clients into disclosing encryption keys for
messages previously sent by that client to user accounts later
compromised by an attacker.
Exploiting this vulnerability to read encrypted messages requires
gaining control over the recipientâÂÂs account. This requires either
compromising their credentials directly or compromising their homeserver.
Discovery 2021-08-23 Entry 2021-09-13 cinny
< 1.2.1
element-web
< 1.8.3
nheko
le 0.8.2_2
CVE-2021-40823
CVE-2021-40824
https://matrix.org/blog/2021/09/13/vulnerability-disclosure-key-sharing
|