First published: Tue Sep 18 2018(Updated: )
Matrix Synapse before 0.33.3.1 allows remote attackers to spoof events and possibly have unspecified other impacts by leveraging improper transaction and event signature validation.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/matrix-synapse | <0.33.2.1 | 0.33.2.1 |
pip/matrix-synapse | >=0.33.3<0.33.3.1 | 0.33.3.1 |
Matrix Synapse | <0.33.3.1 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-16515 is high with a severity value of 8.8.
Remote attackers can spoof events and possibly have unspecified other impacts by leveraging improper transaction and event signature validation in Matrix Synapse before version 0.33.3.1 and 0.33.2.1.
To fix CVE-2018-16515 in Matrix Synapse, update to version 0.33.3.1 or 0.33.2.1.
Yes, you can find references for CVE-2018-16515 at the following links: [Link 1](https://nvd.nist.gov/vuln/detail/CVE-2018-16515), [Link 2](https://github.com/matrix-org/synapse/issues/3796#event-1833126269), [Link 3](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IRW7YR2H3ASUSYX4AO4KMY3FNVDNYW3P/).
CVE-2018-16515 belongs to CWE category 347.