First published: Wed Sep 28 2022(Updated: )
Matrix Javascript SDK is the Matrix Client-Server SDK for JavaScript. Starting with version 17.1.0-rc.1, improperly formed beacon events can disrupt or impede the matrix-js-sdk from functioning properly, potentially impacting the consumer's ability to process data safely. Note that the matrix-js-sdk can appear to be operating normally but be excluding or corrupting runtime data presented to the consumer. This is patched in matrix-js-sdk v19.7.0. Redacting applicable events, waiting for the sync processor to store data, and restarting the client are possible workarounds. Alternatively, redacting the applicable events and clearing all storage will fix the further perceived issues. Downgrading to an unaffected version, noting that such a version may be subject to other vulnerabilities, will additionally resolve the issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Thunderbird | <102.3.1 | 102.3.1 |
Matrix Javascript Sdk | >=17.1.0<19.7.0 | |
Matrix Javascript Sdk | =17.1.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2022-39236 is a vulnerability that affected Thunderbird users who use the Matrix chat protocol, allowing an adversary to cause data corruption issues.
Mozilla Thunderbird version up to 102.3.1 is affected by CVE-2022-39236.
CVE-2022-39236 has a severity level of medium (4 out of 10).
An adversary can exploit CVE-2022-39236 by sending specially crafted messages through the Matrix chat protocol to cause data integrity issues.
You can find more information about CVE-2022-39236 in the references provided: [Mozilla Bugzilla](https://bugzilla.mozilla.org/show_bug.cgi?id=1791765) and [Mozilla Security Advisory](https://www.mozilla.org/en-US/security/advisories/mfsa2022-43/).