Published date: 2023-07-18T16:58:01Z
CVE: CVE-2023-37259
Description
The Export Chat feature includes certain attacker-controlled elements in the generated document without sufficient escaping, leading to stored XSS.
Impact
Since the Export Chat feature generates a separate document, an attacker can only inject code run from the null
origin, restricting the impact.
However, the attacker can still potentially use the XSS to leak message contents. A malicious homeserver is a potential attacker since the affected inputs are controllable server-side.
Patches
This was patched in matrix-react-sdk 3.76.0.
Workarounds
None, other than not using the Export Chat feature.
References
N/A
Affected versions:
["3.32.0", "3.32.1", "3.33.0-rc.1", "3.33.0-rc.2", "3.33.0", "3.34.0-rc.1", "3.34.0", "3.35.0-rc.1", "3.35.1", "3.36.0-rc.1", "3.36.0", "3.36.1", "3.37.0-rc.1", "3.37.0", "3.38.0-rc.1", "3.38.0", "3.39.0-rc.1", "3.39.0-rc.2", "3.39.0", "3.39.1", "3.40.0-rc.1", "3.40.0-rc.2", "3.40.0", "3.40.1", "3.41.0-rc.1", "3.41.0", "3.41.1", "3.42.0-rc.1", "3.42.0", "3.42.1-rc.1", "3.42.1", "3.42.2-rc.1", "3.42.2-rc.2", "3.42.2-rc.3", "3.42.2-rc.4", "3.42.3", "3.42.4", "3.43.0-rc.1", "3.43.0", "3.44.0-rc.1", "3.44.0-rc.2", "3.44.0", "3.45.0-rc.2", "3.45.0-rc.3", "3.45.0", "3.46.0-rc.1", "3.46.0", "3.47.0", "3.48.0-rc.1", "3.48.0", "3.49.0-rc.1", "3.49.0-rc.2", "3.50.0", "3.49.0", "3.51.0-rc.1", "3.51.0", "3.52.0-rc.1", "3.52.0-rc.2", "3.52.0", "3.53.0-rc.1", "3.53.0-rc.2", "3.53.0", "3.54.0-rc.1", "3.54.0", "3.55.0-rc.1", "3.55.0", "3.56.0", "3.57.0", "3.58.0-rc.1", "3.58.0-rc.2", "3.58.0", "3.58.1", "3.59.0-rc.1", "3.59.0-rc.2", "3.59.0", "3.59.1", "3.60.0-rc.1", "3.60.0-rc.2", "3.60.0", "3.61.0-rc.1", "3.61.0", "3.62.0-rc.1", "3.62.0-rc.2", "3.62.0", "3.63.0-rc.2", "3.63.0", "3.64.0-rc.1", "3.64.0-rc.2", "3.64.0-rc.3", "3.64.0-rc.4", "3.64.0", "3.64.1", "3.64.2", "3.65.0-rc.1", "3.65.0", "3.66.0-rc.1", "3.66.0", "3.67.0-rc.1", "3.67.0-rc.2", "3.67.0", "3.68.0-rc.1", "3.68.0-rc.2", "3.68.0-rc.3", "3.68.0", "3.69.0", "3.69.1", "3.70.0-rc.1", "3.70.0", "3.71.0-rc.1", "3.71.0", "3.71.1", "3.72.0-rc.1", "3.72.0-rc.2", "3.72.0", "3.73.0-rc.1", "3.73.0-rc.2", "3.73.0-rc.3", "3.73.0", "3.73.1", "3.74.0-rc1", "3.74.0", "3.75.0-rc.1", "3.75.0", "3.76.0-rc.1", "3.76.0-rc.2"]
Secure versions:
[3.105.1, 3.106.0, 3.106.0-rc.1, 3.107.0, 3.108.0, 3.108.0-rc.0, 3.109.0, 3.109.0-rc.0, 3.110.0, 3.110.0-rc.1, 3.111.0, 3.112.0, 3.112.0-rc.0, 3.113.0, 3.114.0, 3.114.0-rc.0]
Recommendation:
Update to version 3.114.0.
Published date: 2024-08-06T14:12:45Z
CVE: CVE-2024-42347
Impact
A malicious homeserver could manipulate a user's account data to cause the client to enable URL previews in end-to-end encrypted rooms, in which case any URLs in encrypted messages would be sent to the server.
Even if the CVSS score would be 4.1 (AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N) the maintainer classifies this as High severity issue.
Patches
This was patched in matrix-react-sdk 3.105.1.
Workarounds
Deployments that trust their homeservers, as well as closed federations of trusted servers, are not affected.
References
N/A.
Affected versions:
["0.0.1", "0.0.2", "0.1.0", "0.2.0", "0.3.1", "0.5.0", "0.5.1", "0.5.2", "0.6.3", "0.6.4", "0.6.5-r2", "0.6.5-r3", "0.7.1", "0.8.0", "0.8.1-rc.2", "0.8.3-electron", "0.8.5-rc.1", "0.8.5", "0.8.6-rc.1", "0.8.7-rc.2", "0.8.7-rc.4", "0.8.8-rc.1", "0.8.8-rc.2", "0.9.0-rc.1", "0.9.1", "0.9.3-rc.1", "0.9.3-rc.2", "0.9.5-rc.1", "0.9.5-rc.2", "0.9.5", "0.9.6", "0.9.7", "0.10.1-rc.1", "0.10.2", "0.10.3-rc.2", "0.10.3", "0.10.4-rc.1", "0.10.5", "0.10.7-rc.1", "0.10.7-rc.2", "0.10.7-rc.3", "0.11.0-rc.1", "0.11.0-rc.2", "0.11.0-rc.3", "0.11.3", "0.11.4", "0.12.0-rc.4", "0.12.0-rc.5", "0.12.0", "0.12.1", "0.12.3-rc.3", "0.12.4-rc.2", "0.12.4-rc.5", "0.12.4", "0.12.5", "0.12.8", "0.12.9-rc.2", "0.12.9", "0.13.0-rc.1", "0.13.0-rc.2", "0.13.1-rc.1", "0.13.1", "0.13.2", "0.13.3-rc.2", "0.13.4-rc.1", "0.13.4", "0.14.0-rc.1", "0.14.1", "0.14.3", "0.14.5-rc.1", "0.14.5-rc.2", "0.14.5", "1.0.0-rc.2", "1.0.0", "1.0.2-rc.2", "1.0.2", "1.0.3", "1.0.4", "1.0.6-rc.1", "1.0.6", "1.1.0-rc.1", "1.2.0-rc.1", "1.2.2", "1.3.0-rc.1", "1.3.1", "1.4.0-rc.1", "1.4.0-rc.2", "1.4.0", "1.5.0-rc.1", "1.5.1", "1.5.2", "1.5.3-rc.1", "1.5.3-rc.2", "1.5.3-rc.3", "1.6.0", "1.7.1-rc.1", "1.7.1", "1.7.3-rc.1", "1.7.3", "1.7.5-rc.1", "1.7.5", "1.7.6-rc.1", "2.0.0", "2.2.0", "2.2.1", "2.2.2", "2.2.3-rc.1", "2.2.3", "2.3.0-rc.1", "2.3.0", "2.5.0-rc.2", "2.5.0-rc.3", "2.5.0-rc.4", "2.5.0-rc.5", "2.5.0-rc.6", "2.6.0", "2.7.1", "2.7.2", "2.9.0", "2.10.0", "3.2.0-rc.1", "3.2.0", "3.4.0-rc.1", "3.4.0", "3.5.0-rc.1", "3.6.0-rc.1", "3.6.1", "3.7.0-rc.2", "3.8.0", "3.9.0", "3.10.0-rc.1", "3.10.0", "3.11.0-rc.1", "3.11.0-rc.2", "3.11.1", "3.12.0", "3.12.1", "3.13.0-rc.1", "3.13.1", "3.14.0", "3.15.0-rc.1", "3.15.0", "0.3.0", "0.4.0", "0.6.0", "0.6.1", "0.6.2", "0.6.4-r1", "0.6.5", "0.6.5-r1", "0.7.2", "0.7.3", "0.7.4", "0.7.5-rc.1", "0.7.5", "0.8.1-rc.1", "0.8.1", "0.8.2", "0.8.3", "0.8.4", "0.8.6-rc.2", "0.8.6-rc.3", "0.8.6", "0.8.7-rc.1", "0.8.7-rc.3", "0.8.7", "0.8.8", "0.8.9-rc.1", "0.8.9", "0.9.0-rc.2", "0.9.0", "0.9.2", "0.9.3", "0.9.4", "0.10.0-rc.1", "0.10.0-rc.2", "0.10.1", "0.10.3-rc.1", "0.10.4", "0.10.6", "0.10.7", "0.11.0", "0.11.1", "0.11.2", "0.12.0-rc.1", "0.12.0-rc.2", "0.12.0-rc.3", "0.11.4-cryptowarning.1", "0.11.4-cryptowarning.2", "0.12.0-rc.6", "0.12.0-rc.7", "0.12.2", "0.12.3-rc.1", "0.12.3-rc.2", "0.12.3", "0.12.4-rc.1", "0.12.4-rc.3", "0.12.4-rc.4", "0.12.4-rc.6", "0.12.6-rc.1", "0.12.6", "0.12.7-rc.1", "0.12.7", "0.12.8-rc.1", "0.12.8-rc.2", "0.12.9-rc.1", "0.13.0", "0.13.3-rc.1", "0.13.3", "0.13.5-rc.1", "0.13.5", "0.13.6", "0.14.0", "0.14.2-rc.1", "0.14.2", "0.14.4", "0.14.6", "0.14.7-rc.1", "0.14.7-rc.2", "0.14.7", "0.14.8-rc.1", "0.14.8", "1.0.0-rc.1", "1.0.1", "1.0.2-rc.1", "1.0.2-rc.3", "1.0.2-rc.4", "1.0.4-rc.1", "1.0.5", "1.0.7", "1.1.0", "1.1.1", "1.1.2", "1.2.0", "1.2.1", "1.2.2-rc.1", "1.2.2-rc.2", "1.3.0", "1.4.0-rc.3", "1.5.0", "1.5.2-rc.1", "1.5.3", "1.6.0-rc.1", "1.6.0-rc.2", "1.6.1", "1.6.2-rc.1", "1.6.2", "1.7.0-rc.1", "1.7.0", "1.7.1-rc.2", "1.7.2", "1.7.3-rc.2", "1.7.4", "1.7.6-rc.2", "1.7.6", "2.0.0-rc.2", "2.1.0-rc.1", "2.1.0-rc.2", "2.1.0", "2.1.1", "2.2.0-rc.1", "2.3.1", "2.4.0-rc.1", "2.5.0-rc.1", "2.5.0", "2.6.0-rc.1", "2.6.1", "2.7.0-rc.1", "2.7.0-rc.2", "2.7.0", "2.8.0-rc.1", "2.8.0", "2.8.1", "2.9.0-rc.1", "2.10.1", "3.0.0", "3.1.0-rc.1", "3.1.0", "3.3.0-rc.1", "3.3.0", "3.4.1", "3.5.0", "3.6.0", "3.7.0-rc.1", "3.7.0", "3.7.1", "3.8.0-rc.1", "3.9.0-rc.1", "3.11.0", "3.12.0-rc.1", "3.13.0", "3.14.0-rc.1", "3.16.0-rc.1", "3.16.0-rc.2", "3.16.0", "3.17.0-rc.1", "3.17.0", "3.18.0-rc.1", "3.18.0", "3.19.0-rc.1", "3.19.0", "3.20.0-rc.1", "3.20.0", "3.21.0-rc.1", "3.21.0", "3.22.0-rc.1", "3.22.0", "3.23.0-rc.1", "3.23.0", "3.24.0-rc.1", "3.24.0", "3.25.0-rc.1", "3.25.0", "3.26.0-rc.1", "3.26.0", "3.27.0-rc.1", "3.27.0", "3.28.0-rc.1", "3.28.0", "3.28.1", "3.29.0-rc.1", "3.29.0-rc.2", "3.29.0-rc.3", "3.29.0", "3.30.0-rc.1", "3.30.0-rc.2", "3.29.1", "3.30.0", "3.31.0-rc.1", "3.31.0-rc.2", "3.31.0", "3.32.0-rc.1", "3.32.0-rc.2", "3.32.0", "3.32.1", "3.33.0-rc.1", "3.33.0-rc.2", "3.33.0", "3.34.0-rc.1", "3.34.0", "3.35.0-rc.1", "3.35.1", "3.36.0-rc.1", "3.36.0", "3.36.1", "3.37.0-rc.1", "3.37.0", "3.38.0-rc.1", "3.38.0", "3.39.0-rc.1", "3.39.0-rc.2", "3.39.0", "3.39.1", "3.40.0-rc.1", "3.40.0-rc.2", "3.40.0", "3.40.1", "3.41.0-rc.1", "3.41.0", "3.41.1", "3.42.0-rc.1", "3.42.0", "3.42.1-rc.1", "3.42.1", "3.42.2-rc.1", "3.42.2-rc.2", "3.42.2-rc.3", "3.42.2-rc.4", "3.42.3", "3.42.4", "3.43.0-rc.1", "3.43.0", "3.44.0-rc.1", "3.44.0-rc.2", "3.44.0", "3.45.0-rc.2", "3.45.0-rc.3", "3.45.0", "3.46.0-rc.1", "3.46.0", "3.47.0", "3.48.0-rc.1", "3.48.0", "3.49.0-rc.1", "3.49.0-rc.2", "3.50.0", "3.49.0", "3.51.0-rc.1", "3.51.0", "3.52.0-rc.1", "3.52.0-rc.2", "3.52.0", "3.53.0-rc.1", "3.53.0-rc.2", "3.53.0", "3.54.0-rc.1", "3.54.0", "3.55.0-rc.1", "3.55.0", "3.56.0", "3.57.0", "3.58.0-rc.1", "3.58.0-rc.2", "3.58.0", "3.58.1", "3.59.0-rc.1", "3.59.0-rc.2", "3.59.0", "3.59.1", "3.60.0-rc.1", "3.60.0-rc.2", "3.60.0", "3.61.0-rc.1", "3.61.0", "3.62.0-rc.1", "3.62.0-rc.2", "3.62.0", "3.63.0-rc.2", "3.63.0", "3.64.0-rc.1", "3.64.0-rc.2", "3.64.0-rc.3", "3.64.0-rc.4", "3.64.0", "3.64.1", "3.64.2", "3.65.0-rc.1", "3.65.0", "3.66.0-rc.1", "3.66.0", "3.67.0-rc.1", "3.67.0-rc.2", "3.67.0", "3.68.0-rc.1", "3.68.0-rc.2", "3.68.0-rc.3", "3.68.0", "3.69.0", "3.69.1", "3.70.0-rc.1", "3.70.0", "3.71.0-rc.1", "3.71.0", "3.71.1", "3.72.0-rc.1", "3.72.0-rc.2", "3.72.0", "3.73.0-rc.1", "3.73.0-rc.2", "3.73.0-rc.3", "3.73.0", "3.73.1", "3.74.0-rc1", "3.74.0", "3.75.0-rc.1", "3.75.0", "3.76.0-rc.1", "3.76.0-rc.2", "3.76.0", "3.77.0-rc.1", "3.77.0", "3.77.1", "3.78.0-rc.1", "3.78.0", "3.79.0-rc.2", "3.79.0", "3.80.0-rc.1", "3.80.0-rc.2", "3.80.0", "3.80.1", "3.81.0-rc.1", "3.81.0", "3.81.1", "3.82.0-rc.1", "3.82.0", "3.83.0-rc.1", "3.83.0", "3.84.0-rc.1", "3.84.0", "3.84.1", "3.85.0-rc.0", "3.85.0-rc.1", "3.85.0", "3.86.0-rc.2", "3.86.0", "3.87.0-rc.0", "3.87.0", "3.88.0", "3.89.0-rc.0", "3.89.0", "3.90.0", "3.91.0-rc.0", "3.91.0-rc.1", "3.91.0", "3.92.0-rc.0", "3.92.0-rc.1", "3.92.0", "3.93.0-rc.0", "3.93.0", "3.94.0-rc.0", "3.94.0", "3.95.0-rc.0", "3.95.0", "3.96.0-rc.0", "3.96.0", "3.96.1", "3.97.0-rc.0", "3.97.0", "3.98.0-rc.0", "3.98.0", "3.99.0-rc.0", "3.99.0-rc.1", "3.99.0", "3.100.0-rc.0", "3.100.0-rc.1", "3.100.0", "3.101.0-rc.0", "3.101.0-rc.1", "3.101.0", "3.102.0-rc.0", "3.102.0-rc.1", "3.102.0", "3.103.0-rc.1", "3.103.0", "3.104.0-rc.0", "3.104.0-rc.1", "3.104.0"]
Secure versions:
[3.105.1, 3.106.0, 3.106.0-rc.1, 3.107.0, 3.108.0, 3.108.0-rc.0, 3.109.0, 3.109.0-rc.0, 3.110.0, 3.110.0-rc.1, 3.111.0, 3.112.0, 3.112.0-rc.0, 3.113.0, 3.114.0, 3.114.0-rc.0]
Recommendation:
Update to version 3.114.0.
Published date: 2024-10-15T18:11:51Z
CVE: CVE-2024-47824
Impact
matrix-react-sdk before 3.102.0 allows a malicious homeserver to potentially steal message keys for a room when a user invites another user to that room, via injection of a malicious device controlled by the homeserver. This is possible because matrix-react-sdk before 3.102.0 shared historical message keys on invite.
Patches
matrix-react-sdk 3.102.0 disables sharing message keys on invite by removing calls to the vulnerable functionality.
Workarounds
None.
References
The vulnerability in matrix-react-sdk is caused by calling MatrixClient.sendSharedHistoryKeys
in matrix-js-sdk, which is inherently vulnerable to this sort of attack. This matrix-js-sdk vulnerability is tracked as CVE-2024-47080 / GHSA-4jf8-g8wp-cx7c. Given that this functionality is not specific to sharing message keys on invite, is optional, has to be explicitly called by the caller and has been independently patched in matrix-react-sdk by removing the offending calls, we believe it is proper to treat the matrix-react-sdk vulnerability as a separate one, with its own advisory and CVE.
The matrix-org/matrix-react-sdk repository has recently been archived and the project was moved to element-hq/matrix-react-sdk. Given that this happened after the first patched release, no releases of the project on element-hq/matrix-react-sdk were ever vulnerable to this vulnerability.
Patching pull request: https://github.com/matrix-org/matrix-react-sdk/pull/12618.
For more information
If you have any questions or comments about this advisory, please email us at security at security at matrix.org.
Affected versions:
["3.18.0", "3.19.0-rc.1", "3.19.0", "3.20.0-rc.1", "3.20.0", "3.21.0-rc.1", "3.21.0", "3.22.0-rc.1", "3.22.0", "3.23.0-rc.1", "3.23.0", "3.24.0-rc.1", "3.24.0", "3.25.0-rc.1", "3.25.0", "3.26.0-rc.1", "3.26.0", "3.27.0-rc.1", "3.27.0", "3.28.0-rc.1", "3.28.0", "3.28.1", "3.29.0-rc.1", "3.29.0-rc.2", "3.29.0-rc.3", "3.29.0", "3.30.0-rc.1", "3.30.0-rc.2", "3.29.1", "3.30.0", "3.31.0-rc.1", "3.31.0-rc.2", "3.31.0", "3.32.0-rc.1", "3.32.0-rc.2", "3.32.0", "3.32.1", "3.33.0-rc.1", "3.33.0-rc.2", "3.33.0", "3.34.0-rc.1", "3.34.0", "3.35.0-rc.1", "3.35.1", "3.36.0-rc.1", "3.36.0", "3.36.1", "3.37.0-rc.1", "3.37.0", "3.38.0-rc.1", "3.38.0", "3.39.0-rc.1", "3.39.0-rc.2", "3.39.0", "3.39.1", "3.40.0-rc.1", "3.40.0-rc.2", "3.40.0", "3.40.1", "3.41.0-rc.1", "3.41.0", "3.41.1", "3.42.0-rc.1", "3.42.0", "3.42.1-rc.1", "3.42.1", "3.42.2-rc.1", "3.42.2-rc.2", "3.42.2-rc.3", "3.42.2-rc.4", "3.42.3", "3.42.4", "3.43.0-rc.1", "3.43.0", "3.44.0-rc.1", "3.44.0-rc.2", "3.44.0", "3.45.0-rc.2", "3.45.0-rc.3", "3.45.0", "3.46.0-rc.1", "3.46.0", "3.47.0", "3.48.0-rc.1", "3.48.0", "3.49.0-rc.1", "3.49.0-rc.2", "3.50.0", "3.49.0", "3.51.0-rc.1", "3.51.0", "3.52.0-rc.1", "3.52.0-rc.2", "3.52.0", "3.53.0-rc.1", "3.53.0-rc.2", "3.53.0", "3.54.0-rc.1", "3.54.0", "3.55.0-rc.1", "3.55.0", "3.56.0", "3.57.0", "3.58.0-rc.1", "3.58.0-rc.2", "3.58.0", "3.58.1", "3.59.0-rc.1", "3.59.0-rc.2", "3.59.0", "3.59.1", "3.60.0-rc.1", "3.60.0-rc.2", "3.60.0", "3.61.0-rc.1", "3.61.0", "3.62.0-rc.1", "3.62.0-rc.2", "3.62.0", "3.63.0-rc.2", "3.63.0", "3.64.0-rc.1", "3.64.0-rc.2", "3.64.0-rc.3", "3.64.0-rc.4", "3.64.0", "3.64.1", "3.64.2", "3.65.0-rc.1", "3.65.0", "3.66.0-rc.1", "3.66.0", "3.67.0-rc.1", "3.67.0-rc.2", "3.67.0", "3.68.0-rc.1", "3.68.0-rc.2", "3.68.0-rc.3", "3.68.0", "3.69.0", "3.69.1", "3.70.0-rc.1", "3.70.0", "3.71.0-rc.1", "3.71.0", "3.71.1", "3.72.0-rc.1", "3.72.0-rc.2", "3.72.0", "3.73.0-rc.1", "3.73.0-rc.2", "3.73.0-rc.3", "3.73.0", "3.73.1", "3.74.0-rc1", "3.74.0", "3.75.0-rc.1", "3.75.0", "3.76.0-rc.1", "3.76.0-rc.2", "3.76.0", "3.77.0-rc.1", "3.77.0", "3.77.1", "3.78.0-rc.1", "3.78.0", "3.79.0-rc.2", "3.79.0", "3.80.0-rc.1", "3.80.0-rc.2", "3.80.0", "3.80.1", "3.81.0-rc.1", "3.81.0", "3.81.1", "3.82.0-rc.1", "3.82.0", "3.83.0-rc.1", "3.83.0", "3.84.0-rc.1", "3.84.0", "3.84.1", "3.85.0-rc.0", "3.85.0-rc.1", "3.85.0", "3.86.0-rc.2", "3.86.0", "3.87.0-rc.0", "3.87.0", "3.88.0", "3.89.0-rc.0", "3.89.0", "3.90.0", "3.91.0-rc.0", "3.91.0-rc.1", "3.91.0", "3.92.0-rc.0", "3.92.0-rc.1", "3.92.0", "3.93.0-rc.0", "3.93.0", "3.94.0-rc.0", "3.94.0", "3.95.0-rc.0", "3.95.0", "3.96.0-rc.0", "3.96.0", "3.96.1", "3.97.0-rc.0", "3.97.0", "3.98.0-rc.0", "3.98.0", "3.99.0-rc.0", "3.99.0-rc.1", "3.99.0", "3.100.0-rc.0", "3.100.0-rc.1", "3.100.0", "3.101.0-rc.0", "3.101.0-rc.1", "3.101.0", "3.102.0-rc.0", "3.102.0-rc.1"]
Secure versions:
[3.105.1, 3.106.0, 3.106.0-rc.1, 3.107.0, 3.108.0, 3.108.0-rc.0, 3.109.0, 3.109.0-rc.0, 3.110.0, 3.110.0-rc.1, 3.111.0, 3.112.0, 3.112.0-rc.0, 3.113.0, 3.114.0, 3.114.0-rc.0]
Recommendation:
Update to version 3.114.0.