matrix-js-sdk subject to impersonated messages due to permissive key forwarding
- Severity:
- High
Description
An attacker cooperating with a malicious homeserver can construct messages appearing to have come from another person. Such messages will be marked with a grey shield on some platforms, but this may be missing in others.
This attack is possible due to the matrix-js-sdk implementing a too permissive key forwarding strategy on the receiving end.
Recommendation
Update the matrix-js-sdk package to the latest compatible version. Followings are version details:
- Affected version(s): < 19.7.0
- Patched version(s): 19.7.0
References
- GHSA-6263-x97c-c4gg
- matrix.org
- security.gentoo.org
- CVE-2022-39249
- CWE-287
- CAPEC-310
- OWASP 2021-A6
- OWASP 2021-A7
Related Issues
- matrix-js-sdk subject to user impersonation due to key/device identifier confusion in SAS verification - CVE-2022-39250
- matrix-js-sdk subject to user spoofing via Olm/Megolm protocol confusion - CVE-2022-39251
- Improper beacon events in matrix-js-sdk can result in availability issues - CVE-2022-39236
- Matrix JavaScript SDK's key history sharing could share keys to malicious devices - CVE-2024-47080
- Tags:
- npm
- matrix-js-sdk
Anything's wrong? Let us know Last updated on January 30, 2023