First published: Tue Apr 25 2023(Updated: )
### Impact Plain text messages containing HTML tags are rendered as HTML in the search results. To exploit this, an attacker needs to trick a user into searching for a specific message containing an HTML injection payload. Cross-site scripting is possible by including resources from `recaptcha.net` and `gstatic.com` which are included in the default CSP. Thanks to [Cadence Ember](https://cadence.moe/) for finding the injection and to [S1m](https://github.com/p1gp1g/) for finding possible XSS vectors. ### Patches Version 3.71.0 of the SDK fixes the issue. ### Workarounds Restarting the client will clear the injection.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm/matrix-react-sdk | <3.71.0 | 3.71.0 |
Matrix React SDK | <3.71.0 |
https://github.com/matrix-org/matrix-react-sdk/commit/bf182bc94556849d7acdfa0e5fdea2aa129ea826
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-30609 is considered a medium severity vulnerability due to potential cross-site scripting attacks.
To fix CVE-2023-30609, upgrade to matrix-react-sdk version 3.71.0 or later.
CVE-2023-30609 allows for cross-site scripting attacks by rendering plain text messages with HTML tags in search results.
CVE-2023-30609 affects versions of the matrix-react-sdk prior to 3.71.0.
An attacker can exploit CVE-2023-30609 by tricking a user into searching for a specific message that contains an HTML injection payload.