matrix javascript_sdk 认证机制不恰当

admin 2023-11-30 05:49:49 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
中危 matrix javascript_sdk 认证机制不恰当

CVE编号

CVE-2022-39251

利用情况

暂无

补丁情况

官方补丁

披露时间

2022-09-29
漏洞描述
Matrix Javascript SDK is the Matrix Client-Server SDK for JavaScript. Prior to version 19.7.0, an attacker cooperating with a malicious homeserver can construct messages that legitimately appear to have come from another person, without any indication such as a grey shield. Additionally, a sophisticated attacker cooperating with a malicious homeserver could employ this vulnerability to perform a targeted attack in order to send fake to-device messages appearing to originate from another user. This can allow, for example, to inject the key backup secret during a self-verification, to make a targeted device start using a malicious key backup spoofed by the homeserver. These attacks are possible due to a protocol confusion vulnerability that accepts to-device messages encrypted with Megolm instead of Olm. Starting with version 19.7.0, matrix-js-sdk has been modified to only accept Olm-encrypted to-device messages. Out of caution, several other checks have been audited or added. This attack requires coordination between a malicious home server and an attacker, so those who trust their home servers do not need a workaround.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://github.com/matrix-org/matrix-js-sdk/commit/a587d7c36026fe1fcf93dfff63...
https://github.com/matrix-org/matrix-js-sdk/releases/tag/v19.7.0
https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-r48r-j8fx-mq2c
https://matrix.org/blog/2022/09/28/upgrade-now-to-address-encryption-vulns-in...
https://security.gentoo.org/glsa/202210-35
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 matrix javascript_sdk * Up to (excluding) 19.7.0
运行在以下环境
系统 alpine_3.16 riot-web * Up to (excluding) 1.11.7-r0
运行在以下环境
系统 alpine_3.17 riot-web * Up to (excluding) 1.11.7-r0
运行在以下环境
系统 alpine_3.18 element-web * Up to (excluding) 1.11.7-r0
运行在以下环境
系统 alpine_edge element-web * Up to (excluding) 1.11.7-r0
运行在以下环境
系统 amazon_2 thunderbird * Up to (excluding) 102.4.0-1.amzn2.0.1
运行在以下环境
系统 anolis_os_7 thunderbird * Up to (excluding) 102.4.0-1.0.1
运行在以下环境
系统 anolis_os_8 thunderbird * Up to (excluding) 102.4.0-1.0.1
运行在以下环境
系统 centos_7 thunderbird * Up to (excluding) 102.4.0-1.el7_9
运行在以下环境
系统 centos_8 thunderbird * Up to (excluding) 102.4.0-1.el8_6
运行在以下环境
系统 debian_10 node-matrix-js-sdk * Up to (including) 0.9.2-1
运行在以下环境
系统 debian_11 node-matrix-js-sdk * Up to (including) 9.3.0+~cs9.9.16-2
运行在以下环境
系统 debian_sid node-matrix-js-sdk * Up to (including) 9.11.0+~cs9.9.16-2
运行在以下环境
系统 opensuse_Leap_15.3 MozillaThunderbird * Up to (excluding) 102.4.0-150200.8.85.1
运行在以下环境
系统 opensuse_Leap_15.4 MozillaThunderbird * Up to (excluding) 102.4.0-150200.8.85.1
运行在以下环境
系统 oracle_7 oraclelinux-release * Up to (excluding) 102.4.0-1.0.1.el7_9
运行在以下环境
系统 oracle_8 oraclelinux-release * Up to (excluding) 102.4.0-1.0.1.el8_6
运行在以下环境
系统 oracle_9 oraclelinux-release * Up to (excluding) 102.4.0-1.el9_0
运行在以下环境
系统 redhat_7 thunderbird * Up to (excluding) 102.4.0-1.el7_9
运行在以下环境
系统 redhat_8 thunderbird * Up to (excluding) 102.4.0-1.el8_6
运行在以下环境
系统 redhat_9 thunderbird * Up to (excluding) 102.4.0-1.el9_0
运行在以下环境
系统 ubuntu_18.04 thunderbird * Up to (excluding) 1:102.4.2+build2-0ubuntu0.18.04.1
运行在以下环境
系统 ubuntu_20.04 thunderbird * Up to (excluding) 1:102.4.2+build2-0ubuntu0.20.04.1
运行在以下环境
系统 ubuntu_22.04 thunderbird * Up to (excluding) 1:102.4.2+build2-0ubuntu0.22.04.1
运行在以下环境
系统 ubuntu_22.10 thunderbird * Up to (excluding) 1:102.4.2+build2-0ubuntu0.22.10.1
阿里云评分 6.3
  • 攻击路径 本地
  • 攻击复杂度 复杂
  • 权限要求 无需权限
  • 影响范围 越权影响
  • EXP成熟度 未验证
  • 补丁情况 官方补丁
  • 数据保密性 数据泄露
  • 数据完整性 无影响
  • 服务器危害 无影响
  • 全网数量 N/A
CWE-ID 漏洞类型
CWE-287 认证机制不恰当
CWE-322 未进行实体认证的密钥交换
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  1