中危 matrix javascript_sdk 认证机制不恰当

CVE编号

CVE-2022-39249

利用情况

暂无

补丁情况

官方补丁

披露时间

2022-09-29
漏洞描述
Matrix Javascript SDK is the Matrix Client-Server SDK for JavaScript. Prior to version 19.7.0, an attacker cooperating with a malicious homeserver can construct messages appearing to have come from another person. Such messages will be marked with a grey shield on some platforms, but this may be missing in others. This attack is possible due to the matrix-js-sdk implementing a too permissive key forwarding strategy on the receiving end. Starting with version 19.7.0, the default policy for accepting key forwards has been made more strict in the matrix-js-sdk. matrix-js-sdk will now only accept forwarded keys in response to previously issued requests and only from own, verified devices. The SDK now sets a `trusted` flag on the decrypted message upon decryption, based on whether the key used to decrypt the message was received from a trusted source. Clients need to ensure that messages decrypted with a key with `trusted = false` are decorated appropriately, for example, by showing a warning for such messages. This attack requires coordination between a malicious homeserver and an attacker, and those who trust your homeservers do not need a workaround.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 matrix javascript_sdk * Up to
(excluding)
19.7.0
运行在以下环境
系统 alma_linux_8 thunderbird * Up to
(excluding)
102.4.0-1.el8_6.alma.plus.1
运行在以下环境
系统 alma_linux_9 thunderbird * Up to
(excluding)
102.4.0-1.el9_0.alma.plus
运行在以下环境
系统 alpine_3.16 riot-web * Up to
(excluding)
1.11.7-r0
运行在以下环境
系统 alpine_3.17 riot-web * Up to
(excluding)
1.11.7-r0
运行在以下环境
系统 alpine_3.18 element-web * Up to
(excluding)
1.11.7-r0
运行在以下环境
系统 alpine_3.19 element-web * Up to
(excluding)
1.11.7-r0
运行在以下环境
系统 amazon_2 thunderbird * Up to
(excluding)
102.4.0-1.amzn2.0.1
运行在以下环境
系统 anolis_os_7 thunderbird * Up to
(excluding)
102.4.0-1.0.1
运行在以下环境
系统 anolis_os_8 thunderbird * Up to
(excluding)
102.4.0-1.0.1
运行在以下环境
系统 opensuse_Leap_15.3 MozillaThunderbird * Up to
(excluding)
102.4.0-150200.8.85.1
运行在以下环境
系统 opensuse_Leap_15.4 MozillaThunderbird * Up to
(excluding)
102.4.0-150200.8.85.1
运行在以下环境
系统 oracle_7 thunderbird * Up to
(excluding)
102.4.0-1.0.1.el7_9
运行在以下环境
系统 oracle_8 thunderbird * Up to
(excluding)
102.4.0-1.0.1.el8_6
运行在以下环境
系统 oracle_9 thunderbird * Up to
(excluding)
102.4.0-1.el9_0
运行在以下环境
系统 redhat_7 thunderbird * Up to
(excluding)
102.4.0-1.el7_9
运行在以下环境
系统 redhat_8 thunderbird * Up to
(excluding)
102.4.0-1.el8_6
运行在以下环境
系统 redhat_9 thunderbird * Up to
(excluding)
102.4.0-1.el9_0
运行在以下环境
系统 rocky_linux_8 thunderbird * Up to
(excluding)
102.4.0-1.el8_6
运行在以下环境
系统 ubuntu_18.04 thunderbird * Up to
(excluding)
102.4.2+build2-0ubuntu0.18.04.1
运行在以下环境
系统 ubuntu_20.04 thunderbird * Up to
(excluding)
102.4.2+build2-0ubuntu0.20.04.1
运行在以下环境
系统 ubuntu_22.04 thunderbird * Up to
(excluding)
102.4.2+build2-0ubuntu0.22.04.1
运行在以下环境
系统 ubuntu_22.10 thunderbird * Up to
(excluding)
102.4.2+build2-0ubuntu0.22.10.1
阿里云评分
6.3
  • 攻击路径
    本地
  • 攻击复杂度
    复杂
  • 权限要求
    无需权限
  • 影响范围
    越权影响
  • EXP成熟度
    未验证
  • 补丁情况
    官方补丁
  • 数据保密性
    数据泄露
  • 数据完整性
    无影响
  • 服务器危害
    无影响
  • 全网数量
    N/A
CWE-ID 漏洞类型
CWE-287 认证机制不恰当
CWE-322 未进行实体认证的密钥交换
阿里云安全产品覆盖情况