First published: Fri Aug 04 2023(Updated: )
### Impact It was possible to craft an event such that it would leak part of a targeted message event from another bridged room. This required knowing an event ID to target. ### Patches Please upgrade to 1.0.1. ### Workarounds You can set the `matrixHandler.eventCacheSize` config value to `0` to workaround this bug. However, this may impact performance. ### Credits Discovered and reported by [Val Lorentz](https://valentin-lorentz.fr/). ### For more information If you have any questions or comments about this advisory email us at [security@matrix.org](mailto:security@matrix.org).
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Matrix Matrix Irc Bridge | <1.0.1 | |
npm/matrix-appservice-irc | <=1.0.0 | 1.0.1 |
https://github.com/matrix-org/matrix-appservice-irc/commit/8bbd2b69a16cbcbeffdd9b5c973fd89d61498d75
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-38700 is a vulnerability in the matrix-appservice-irc Node.js IRC bridge for Matrix.
The impact of CVE-2023-38700 is that it allows an attacker to leak part of a targeted message event from another bridged room.
To fix CVE-2023-38700, please upgrade to version 1.0.1 of matrix-appservice-irc.
Yes, you can set the `matrixHandler.eventCacheSize` config value to `0` as a workaround for CVE-2023-38700.
CVE-2023-38700 has a severity level of low.