First published: Tue Nov 12 2024(Updated: )
### Summary matrix-js-sdk before 34.11.0 is vulnerable to client-side path traversal via crafted MXC URIs. A malicious room member can trigger clients based on the matrix-js-sdk to issue arbitrary authenticated GET requests to the client's homeserver. ### Details The Matrix specification demands homeservers to [perform validation](https://spec.matrix.org/v1.12/client-server-api/#security-considerations-5) of the `server-name` and `media-id` components of MXC URIs with the intent to prevent path traversal. However, it is not mentioned that a similar check must also be performed on the client to prevent *client-side* path traversal. matrix-js-sdk fails to perform this validation. ### Patches Fixed in matrix-js-sdk 34.11.1. ### Workarounds None. ### References - https://spec.matrix.org/v1.12/client-server-api/#security-considerations-5 - https://blog.doyensec.com/2024/07/02/cspt2csrf.html
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm/matrix-js-sdk | <34.11.1 | 34.11.1 |
Thunderbird | <128.5.2 | 128.5.2 |
Thunderbird | <134 | 134 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-50336 has been classified as a moderate severity vulnerability due to the potential for client-side path traversal.
To fix CVE-2024-50336, upgrade the matrix-js-sdk to version 34.11.1 or later.
Clients using matrix-js-sdk versions prior to 34.11.0 are affected by CVE-2024-50336.
CVE-2024-50336 allows a malicious room member to issue arbitrary authenticated GET requests to the client's homeserver.
CVE-2024-50336 affects matrix-js-sdk, Mozilla Thunderbird, and specific versions of these packages.