First published: Tue Sep 13 2022(Updated: )
matrix-appservice-irc is an open source Node.js IRC bridge for Matrix. Attackers can specify a specific string of characters, which would confuse the bridge into combining an attacker-owned channel and an existing channel, allowing them to grant themselves permissions in the channel. The vulnerability has been patched in matrix-appservice-irc 0.35.0. As a workaround operators may disable dynamic channel joining via `dynamicChannels.enabled` to prevent users from joining new channels, which prevents any new channels being bridged outside of what is already bridged, and what is specified in the config.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Matrix Matrix Irc Bridge | <0.35.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-39203 is a vulnerability in matrix-appservice-irc where attackers can combine an attacker-owned channel and an existing channel, granting themselves permissions in the channel.
CVE-2022-39203 has a severity rating of high (8.8).
CVE-2022-39203 affects Matrix Matrix Irc Bridge version up to and exclusive of 0.35.0.
An attacker can exploit CVE-2022-39203 by specifying a specific string of characters that confuses the bridge and allows them to grant themselves permissions in a channel.
Yes, a fix for CVE-2022-39203 is available in version 0.35.0 of matrix-appservice-irc.