First published: Fri Aug 04 2023(Updated: )
### Impact A malicious Matrix server can use a foreign user's MXID in an OpenID exchange, allowing a bad actor to impersonate users when using the provisioning API. ### Details The library does not check that the servername part of the `sub` parameter (containing the user's *claimed* MXID) is the same as the servername we are talking to. A malicious actor could spin up a server on any given domain, respond with a `sub` parameter according to the user they want to act as and use the resulting token to perform provisioning requests. ### Workarounds Disable the provisioning API. If the bridge does not use the provisioning API, you are not vulnerable.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm/matrix-appservice-bridge | =9.0.0 | 9.0.1 |
npm/matrix-appservice-bridge | >=4.0.0<8.1.2 | 8.1.2 |
Matrix Matrix-appservice-bridge | >=4.0.0<8.1.2 | |
Matrix Matrix-appservice-bridge | =9.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-38691.
The severity of CVE-2023-38691 is medium with a CVSS score of 6.5.
Versions 4.0.0 to 8.1.2 of matrix-appservice-bridge are affected by CVE-2023-38691. Versions 8.1.2 and 9.0.0 are specifically mentioned.
A malicious Matrix server can use a foreign user's MXID in an OpenID exchange, allowing them to impersonate users.
Update to version 9.0.1 of matrix-appservice-bridge.