matrix software_development_kit 认证机制不恰当

admin 2023-11-30 05:49:53 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
中危 matrix software_development_kit 认证机制不恰当

CVE编号

CVE-2022-39248

利用情况

暂无

补丁情况

官方补丁

披露时间

2022-09-29
漏洞描述
matrix-android-sdk2 is the Matrix SDK for Android. Prior to version 1.5.1, an attacker cooperating with a malicious homeserver can construct messages that legitimately appear to have come from another person, without any indication such as a grey shield. Additionally, a sophisticated attacker cooperating with a malicious homeserver could employ this vulnerability to perform a targeted attack in order to send fake to-device messages appearing to originate from another user. This can allow, for example, to inject the key backup secret during a self-verification, to make a targeted device start using a malicious key backup spoofed by the homeserver. matrix-android-sdk2 would then additionally sign such a key backup with its device key, spilling trust over to other devices trusting the matrix-android-sdk2 device. These attacks are possible due to a protocol confusion vulnerability that accepts to-device messages encrypted with Megolm instead of Olm. matrix-android-sdk2 version 1.5.1 has been modified to only accept Olm-encrypted to-device messages and to stop signing backups on a successful decryption. Out of caution, several other checks have been audited or added. This attack requires coordination between a malicious home server and an attacker, so those who trust their home servers do not need a workaround.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://github.com/matrix-org/matrix-android-sdk2/commit/77df720a238d17308dea...
https://github.com/matrix-org/matrix-android-sdk2/releases/tag/v1.5.1
https://github.com/matrix-org/matrix-android-sdk2/security/advisories/GHSA-fp...
https://matrix.org/blog/2022/09/28/upgrade-now-to-address-encryption-vulns-in...
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 matrix software_development_kit * Up to (excluding) 1.5.1
阿里云评分 6.2
  • 攻击路径 本地
  • 攻击复杂度 复杂
  • 权限要求 普通权限
  • 影响范围 越权影响
  • EXP成熟度 未验证
  • 补丁情况 官方补丁
  • 数据保密性 无影响
  • 数据完整性 无影响
  • 服务器危害 无影响
  • 全网数量 N/A
CWE-ID 漏洞类型
CWE-287 认证机制不恰当
CWE-322 未进行实体认证的密钥交换
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  1