First published: Mon Apr 12 2021(Updated: )
### Impact Requests to user provided domains were not restricted to external IP addresses when transitional IPv6 addresses were used. Outbound requests to federation, identity servers, when calculating the key validity for third-party invite events, sending push notifications, and generating URL previews are affected. This could cause Synapse to make requests to internal infrastructure on dual-stack networks. ### Patches This issue is fixed by #9240. ### Workarounds Outbound requests to the following address ranges can be blocked by a firewall, if unused for internal communication between systems: * `::ffff/80` * `::0000/80` (note that this IP range is considered deprecated by the IETF) * `2002::/16` (note that this IP range is considered deprecated by the IETF) ### References * [RFC3056](https://tools.ietf.org/html/rfc3056) * [RFC4291](https://tools.ietf.org/html/rfc4291)
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Matrix Synapse | <1.28.0 | |
Fedoraproject Fedora | =34 | |
pip/matrix-synapse | <1.28.0rc1 | 1.28.0rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21392 is a vulnerability in Synapse, a Matrix reference homeserver, that allows requests to user provided domains without restrictions on IP addresses.
CVE-2021-21392 affects Matrix Synapse versions up to and excluding 1.28.0.
CVE-2021-21392 has a severity rating of 6.3 (medium).
To fix CVE-2021-21392, update to version 1.28.0 or newer of Matrix Synapse.
Yes, here are some references for CVE-2021-21392: [GitHub Pull Request](https://github.com/matrix-org/synapse/pull/9240), [GitHub Security Advisory](https://github.com/matrix-org/synapse/security/advisories/GHSA-5wrh-4jwv-5w78), [Fedora Project Announcement](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/).