First published: Tue Mar 28 2023(Updated: )
### Impact In certain configurations, data sent by remote servers containing special strings in key locations could cause modifications of the `Object.prototype`, disrupting matrix-js-sdk functionality, causing denial of service and potentially affecting program logic. (This is part 2, where [CVE-2022-36059](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36059) / [GHSA-rfv9-x7hh-xc32](https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-rfv9-x7hh-xc32) is part 1. Part 2 covers remaining vectors not covered by part 1, found in a codebase audit scheduled after part 1.) ### Patches The issue has been patched in matrix-js-sdk 24.0.0. ### Workarounds None. ### References - [Release blog post](https://matrix.org/blog/2023/03/28/security-releases-matrix-js-sdk-24-0-0-and-matrix-react-sdk-3-69-0) - The advisory [GHSA-rfv9-x7hh-xc32](https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-rfv9-x7hh-xc32) ([CVE-2022-36059](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36059)) refers to an initial set of vulnerable locations discovered and patched in matrix-js-sdk 19.4.0. We opted not to disclose that advisory while we performed an audit of the codebase and are now disclosing it jointly with this one. ### For more information If you have any questions or comments about this advisory please email us at [security at matrix.org](mailto:security@matrix.org).
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm/matrix-js-sdk | <24.0.0 | 24.0.0 |
Mozilla Thunderbird | <102.9.1 | 102.9.1 |
debian/node-matrix-js-sdk | <=0.9.2-1<=9.3.0+~cs9.9.16-2<=9.11.0+~cs9.9.16-2 | |
debian/thunderbird | <=1:91.12.0-1~deb10u1 | 1:115.4.1-1~deb10u1 1:102.13.1-1~deb11u1 1:115.4.1-1~deb11u1 1:102.15.1-1~deb12u1 1:115.4.1-1~deb12u1 1:115.3.1-1 1:115.4.1-1 |
Matrix Javascript Sdk | <24.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28427 is a vulnerability that affects Thunderbird users who use the Matrix chat protocol, allowing for a denial-of-service attack.
This vulnerability allows modifications to the Object.prototype, disrupting matrix-js-sdk functionality, causing denial of service and potentially affecting program logic.
Thunderbird versions up to and including 1:91.12.0-1~deb10u1 and matrix-js-sdk versions up to and excluding 24.0.0 are affected.
CVE-2023-28427 has a severity score of 8.2 (High).
To fix CVE-2023-28427, it is recommended to update Thunderbird to version 1:115.3.1-1~deb10u1 (or higher) and matrix-js-sdk to version 24.0.0 (or higher).