First published: Mon Sep 12 2022(Updated: )
Dendrite is a Matrix homeserver written in Go. In affected versions events retrieved from a remote homeserver using the `/get_missing_events` path did not have their signatures verified correctly. This could potentially allow a remote homeserver to provide invalid/modified events to Dendrite via this endpoint. Note that this does not apply to events retrieved through other endpoints (e.g. `/event`, `/state`) as they have been correctly verified. Homeservers that have federation disabled are not vulnerable. The problem has been fixed in Dendrite 0.9.8. Users are advised to upgrade. There are no known workarounds for this issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Matrix Dendrite | <0.9.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-39200 is a vulnerability in the Matrix homeserver Dendrite that allows a remote homeserver to provide invalid/modified events via the `/get_missing_events` path.
The severity of CVE-2022-39200 is high with a CVSS score of 5.3.
This vulnerability can potentially allow a remote homeserver to provide invalid/modified events to your Dendrite Matrix homeserver.
Versions up to exclusive of 0.9.8 of Dendrite are affected by CVE-2022-39200.
To fix CVE-2022-39200, update your Dendrite Matrix homeserver to a version higher than 0.9.8.