8.6
CWE
287 322
Advisory Published
Updated

CVE-2022-39251: Matrix Javascript SDK vulnerable to Olm/Megolm protocol confusion

First published: Wed Sep 28 2022(Updated: )

Matrix Javascript SDK is the Matrix Client-Server SDK for JavaScript. Prior to version 19.7.0, an attacker cooperating with a malicious homeserver can construct messages that legitimately appear to have come from another person, without any indication such as a grey shield. Additionally, a sophisticated attacker cooperating with a malicious homeserver could employ this vulnerability to perform a targeted attack in order to send fake to-device messages appearing to originate from another user. This can allow, for example, to inject the key backup secret during a self-verification, to make a targeted device start using a malicious key backup spoofed by the homeserver. These attacks are possible due to a protocol confusion vulnerability that accepts to-device messages encrypted with Megolm instead of Olm. Starting with version 19.7.0, matrix-js-sdk has been modified to only accept Olm-encrypted to-device messages. Out of caution, several other checks have been audited or added. This attack requires coordination between a malicious home server and an attacker, so those who trust their home servers do not need a workaround.

Credit: security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
Mozilla Thunderbird<102.3.1
102.3.1
Matrix Javascript Sdk<19.7.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Peer vulnerabilities

(Found alongside the following vulnerabilities)

Frequently Asked Questions

  • What is CVE-2022-39251?

    CVE-2022-39251 is a vulnerability that affects Thunderbird users who use the Matrix chat protocol.

  • How does CVE-2022-39251 impact Thunderbird users?

    CVE-2022-39251 allows an adversary to spoof historical messages from other users and exfiltrate message keys.

  • Which version of Thunderbird is affected by CVE-2022-39251?

    Thunderbird version 102.3.1 is affected by CVE-2022-39251.

  • What is the severity of CVE-2022-39251?

    CVE-2022-39251 has a severity rating of high with a value of 7.

  • How can Thunderbird users protect themselves from CVE-2022-39251?

    Users should update Thunderbird to version 102.3.1 or later to protect themselves from CVE-2022-39251.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203