First published: Mon Apr 12 2021(Updated: )
### Impact Missing input validation of some parameters on the endpoints used to confirm third-party identifiers could cause excessive use of disk space and memory leading to resource exhaustion. ### Patches The issue is fixed by #9321. ### Workarounds Depending on the needs and configuration of the homeserver a few options are available: 1. Using email as third-party identifiers be disabled by not configuring the `email` setting. 2. Using phone numbers as third-party identifiers can be disabled by ensuring that `account_threepid_delegates.msisdn` is not configured. 3. Additionally, the affected endpoint patterns can be blocked at a reverse proxy: * `^/_matrix/client/(r0|unstable)/register/email` * `^/_matrix/client/(r0|unstable)/register/msisdn` * `^/_matrix/client/(r0|unstable)/account/password` * `^/_matrix/client/(r0|unstable)/account/3pid`
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Matrix Synapse | >0.17.0<1.28.0 | |
Fedoraproject Fedora | =34 | |
pip/matrix-synapse | <1.28.0 | 1.28.0 |
>0.17.0<1.28.0 | ||
=34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21394 is a vulnerability found in Synapse, a Matrix reference homeserver, that allows for input validation bypass.
The severity of CVE-2021-21394 is medium with a CVSS score of 6.5.
CVE-2021-21394 allows attackers to bypass input validation on certain endpoints used to confirm third-party identity.
To fix CVE-2021-21394, it is recommended to update Synapse to version 1.28.0 or later.
The CWE ID for CVE-2021-21394 is CWE-20, which stands for Improper Input Validation.