First published: Fri Mar 26 2021(Updated: )
### Impact The password reset endpoint served via Synapse was vulnerable to cross-site scripting (XSS) attacks. The impact depends on the configuration of the domain that Synapse is deployed on, but may allow access to cookies and other browser data, CSRF vulnerabilities, and access to other resources served on the same domain or parent domains. ### Patches This is fixed in #9200. ### Workarounds Depending on the needs and configuration of the homeserver a few options are available: 1. Password resets can be disabled by delegating email to a third-party service (via the `account_threepid_delegates.email` setting) or disabling email (by not configuring the `email` setting). 2. If the homeserver is not configured to use passwords (via the `password_config.enabled` setting) then the affected endpoint can be blocked at a reverse proxy: * `/_synapse/client/password_reset/email/submit_token` 3. The `password_reset_confirmation.html` template can be overridden with a custom template that manually escapes the variables using [JInja2's `escape` filter](https://jinja.palletsprojects.com/en/2.11.x/templates/#escape). See the `email.template_dir` setting.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Matrix Synapse | <1.27.0 | |
Fedoraproject Fedora | =34 | |
pip/matrix-synapse | <1.27.0 | 1.27.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21332 is a vulnerability in Synapse, a Matrix reference homeserver, that allows for cross-site scripting (XSS) attacks.
CVE-2021-21332 has a severity rating of 8.2, which is considered high.
CVE-2021-21332 affects Synapse versions up to and excluding 1.27.0, making them vulnerable to cross-site scripting (XSS) attacks.
To fix CVE-2021-21332, upgrade to Synapse version 1.27.0 or higher.
Yes, Fedora version 34 is affected by CVE-2021-21332.