First published: Fri Oct 16 2020(Updated: )
### Impact The fallback authentication endpoint served via Synapse was vulnerable to cross-site scripting (XSS) attacks. The impact depends on the configuration of the domain that Synapse is deployed on, but may allow access to cookies and other browser data, CSRF vulnerabilities, and access to other resources served on the same domain or parent domains. ### Patches This is fixed by #8444, which is included in Synapse v1.21.0. ### Workarounds If the homeserver is not configured to use reCAPTCHA, consent (terms of service), or single sign-on then the affected endpoint can be blocked at a reverse proxy: * `/_matrix/client/r0/auth/.*/fallback/web` * `/_matrix/client/unstable/auth/.*/fallback/web`
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Matrix Synapse | <1.21.0 | |
pip/matrix-synapse | <1.21.0 | 1.21.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-26891 is a vulnerability in Matrix Synapse before version 1.21.0 that allows for XSS attacks due to unsafe interpolation of the session GET parameter.
An attacker can exploit CVE-2020-26891 by supplying a malicious URL to the /_matrix/client/r0/auth/* endpoint, which can execute an XSS attack on the domain Synapse is hosted on.
CVE-2020-26891 has a severity rating of 6.1 (Medium).
To fix CVE-2020-26891, upgrade Matrix Synapse to version 1.21.0 or later.
More information about CVE-2020-26891 can be found in the references provided: [GitHub Pull Request](https://github.com/matrix-org/synapse/pull/8444), [GitHub Release](https://github.com/matrix-org/synapse/releases/tag/v1.21.2), [GitHub Security Advisory](https://github.com/matrix-org/synapse/security/advisories/GHSA-3x8c-fmpc-5rmq)