CWE
287
Advisory Published
CVE Published
Updated

CVE-2023-32682

First published: Tue Jun 06 2023(Updated: )

Synapse is a Matrix protocol homeserver written in Python with the Twisted framework. In affected versions it may be possible for a deactivated user to login when using uncommon configurations. This only applies if any of the following are true: 1. JSON Web Tokens are enabled for login via the `jwt_config.enabled` configuration setting. 2. The local password database is enabled via the `password_config.enabled` and `password_config.localdb_enabled` configuration settings *and* a user's password is updated via an admin API after a user is deactivated. Note that the local password database is enabled by default, but it is uncommon to set a user's password after they've been deactivated. Installations that are configured to only allow login via Single Sign-On (SSO) via CAS, SAML or OpenID Connect (OIDC); or via an external password provider (e.g. LDAP) are not affected. If not using JSON Web Tokens, ensure that deactivated users do not have a password set. This issue has been addressed in version 1.85.0. Users are advised to upgrade.

Credit: security-advisories@github.com security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
Matrix Synapse<1.85.0
pip/matrix-synapse<1.85.0
1.85.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2023-32682?

    CVE-2023-32682 is a vulnerability in Synapse, a Matrix protocol homeserver written in Python, that allows a deactivated user to login when using uncommon configurations.

  • What is the severity of CVE-2023-32682?

    CVE-2023-32682 has a severity score of 5.4, which is considered medium.

  • How does CVE-2023-32682 affect Synapse?

    CVE-2023-32682 affects Synapse versions up to and excluding 1.85.0.

  • How can this vulnerability be exploited?

    This vulnerability can be exploited when JSON Web Tokens are enabled for login via the `jwt_` configuration option and uncommon configurations are used.

  • Is there a fix for CVE-2023-32682?

    Yes, the fix for CVE-2023-32682 is available in the following pull requests: [PR 15624](https://github.com/matrix-org/synapse/pull/15624) and [PR 15634](https://github.com/matrix-org/synapse/pull/15634).

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203