First published: Fri Aug 04 2023(Updated: )
### Impact It is possible to craft a command with newlines which would not be properly parsed. This would mean you could pass a string of commands as a channel name, which would then be run by the IRC bridge bot. ### Patches Versions 1.0.1 and above are patched. ### Workarounds There are no robust workarounds to the bug. You can disable dynamic channels in the config to disable the most common execution method but others may exist. It is highly recommended to upgrade the bridge. ### Credits Discovered and reported by [Val Lorentz](https://valentin-lorentz.fr/). ### For more information If you have any questions or comments about this advisory email us at [security@matrix.org](mailto:security@matrix.org).
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Matrix Matrix Irc Bridge | <1.0.1 | |
npm/matrix-appservice-irc | <=1.0.0 | 1.0.1 |
https://github.com/matrix-org/matrix-appservice-irc/commit/0afb064635d37e039067b5b3d6423448b93026d3
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-38690 is critical with a CVSS score of 9.8.
To exploit CVE-2023-38690, you would need to craft a command with newlines to be run by the IRC bridge bot.
Yes, CVE-2023-38690 is patched in versions 1.0.1 and above.
No, there are no known workarounds for CVE-2023-38690.
You can find more information about CVE-2023-38690 on the GitHub security advisories and release pages.