CWE
755
Advisory Published
Updated

CVE-2022-39380: wire-webapp contains Improper Handling of Exceptional Conditions leading to a DoS via Markdown Rendering

First published: Fri Jan 27 2023(Updated: )

Wire web-app is part of Wire communications. Versions prior to 2022-11-02 are subject to Improper Handling of Exceptional Conditions. In the wire-webapp, certain combinations of Markdown formatting can trigger an unhandled error in the conversion to HTML representation. The error makes it impossible to display the affected chat history, other conversations are not affected. The issue has been fixed in version 2022-11-02 and is already deployed on all Wire managed services. On-premise instances of wire-webapp need to be updated to docker tag 2022-11-02-production.0-v0.31.9-0-337e400 or wire-server 2022-11-03 (chart/4.26.0), so that their applications are no longer affected. As a workaround, you may use an iOS or Android client and delete the corresponding message from the history OR write 30 or more messages into the affected conversation to prevent the client from further rendering of the corresponding message. When attempting to retrieve messages from the conversation history, the error will continue to occur once the malformed message is part of the result.

Credit: security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
Wire Wire-webapp<2022-11-02

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability ID for this Wire web-app vulnerability?

    The vulnerability ID for this Wire web-app vulnerability is CVE-2022-39380.

  • What is the severity of CVE-2022-39380?

    The severity of CVE-2022-39380 is medium with a CVSS score of 5.3.

  • What is the description of CVE-2022-39380?

    CVE-2022-39380 is an Improper Handling of Exceptional Conditions vulnerability in the Wire web-app where certain combinations of Markdown formatting can trigger an unhandled error in the conversion to HTML representation.

  • What software versions are affected by CVE-2022-39380?

    Versions prior to 2022-11-02 of the Wire web-app are affected by CVE-2022-39380.

  • How can I fix CVE-2022-39380?

    To fix CVE-2022-39380, it is recommended to update the Wire web-app to version 2022-11-02 or later.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203