matrix-appservice-irc is an open source Node.js IRC bridge for Matrix. Attackers can specify a specific string of characters, which would confuse the bridge into combining an attacker-owned channel and an existing channel, allowing them to grant themselves permissions in the channel. The vulnerability has been patched in matrix-appservice-irc 0.35.0. As a workaround operators may disable dynamic channel joining via `dynamicChannels.enabled` to prevent users from joining new channels, which prevents any new channels being bridged outside of what is already bridged, and what is specified in the config.
References
Link | Resource |
---|---|
https://matrix.org/blog/2022/09/13/security-release-of-matrix-appservice-irc-0-35-0-high-severity/ | Vendor Advisory |
https://github.com/matrix-org/matrix-appservice-irc/security/advisories/GHSA-xvqg-mv25-rwvw | Mitigation Third Party Advisory |
Configurations
Information
Published : 2022-09-13 12:15
Updated : 2022-09-15 19:38
NVD link : CVE-2022-39203
Mitre link : CVE-2022-39203
JSON object : View
CWE
CWE-269
Improper Privilege Management
Products Affected
matrix
- matrix_irc_bridge