First published: Tue Sep 26 2023(Updated: )
### Impact Users were able to forge read receipts for any event (if they knew the room ID and event ID). Note that the users were not able to view the events, but simply mark it as read. This could be confusing as clients will show the event as read by the user, even if they are not in the room. ### Patches https://github.com/matrix-org/synapse/pull/16327 ### Workarounds There is no workaround.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/matrix-synapse | >=0.34.0<1.93.0 | 1.93.0 |
>=1.34.0<1.93.0 | ||
=37 | ||
=38 | ||
Matrix Synapse | >=1.34.0<1.93.0 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Users were able to forge read receipts for any event (if they knew the room ID and event ID), causing clients to show the event as read by the user even if they are not in the room.
By knowing the room ID and event ID, users could mark any event as read.
The 'matrix-synapse' package with a version between 0.34.0 and 1.93.0, installed via 'pip'.
Update the 'matrix-synapse' package to version 1.93.0 or higher using 'pip' package manager.
You can find more information about CVE-2023-42453 on the GitHub security advisory page.