CWE
674
Advisory Published
Updated

CVE-2022-31052

First published: Tue Jun 28 2022(Updated: )

Synapse is an open source home server implementation for the Matrix chat network. In versions prior to 1.61.1 URL previews of some web pages can exhaust the available stack space for the Synapse process due to unbounded recursion. This is sometimes recoverable and leads to an error for the request causing the problem, but in other cases the Synapse process may crash altogether. It is possible to exploit this maliciously, either by malicious users on the homeserver, or by remote users sending URLs that a local user's client may automatically request a URL preview for. Remote users are not able to exploit this directly, because the URL preview endpoint is authenticated. Deployments with `url_preview_enabled: false` set in configuration are not affected. Deployments with `url_preview_enabled: true` set in configuration **are** affected. Deployments with no configuration value set for `url_preview_enabled` are not affected, because the default is `false`. Administrators of homeservers with URL previews enabled are advised to upgrade to v1.61.1 or higher. Users unable to upgrade should set `url_preview_enabled` to false.

Credit: security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
Matrix Synapse<1.61.1
Fedoraproject Fedora=35
Fedoraproject Fedora=36

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2022-31052?

    CVE-2022-31052 is a vulnerability in Synapse, an open source home server implementation for the Matrix chat network, that can cause stack exhaustion due to unbounded recursion in URL previews of certain web pages.

  • How does CVE-2022-31052 affect Synapse and Fedoraproject Fedora?

    CVE-2022-31052 affects Synapse versions prior to 1.61.1 and Fedoraproject Fedora versions 35 and 36.

  • What is the severity of CVE-2022-31052?

    CVE-2022-31052 has a severity level of medium, with a severity value of 6.5.

  • How can CVE-2022-31052 be exploited?

    CVE-2022-31052 can be exploited by sending requests with specially crafted URLs that trigger unbounded recursion in URL previews.

  • How do I fix CVE-2022-31052?

    To fix CVE-2022-31052, it is recommended to update to Synapse version 1.61.1 or later.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203