Impact
The Matrix specification specifies a list of event authorization rules which must be checked when determining if an event should be accepted into a room.
In versions of Synapse up to and including v1.61, some of these rules are not correctly applied. An attacker could craft events which would be accepted by Synapse but not a spec-conformant server, potentially causing divergence in the room state between servers.
Patches
Administrators of homeservers with federation enabled are advised to upgrade to v1.62.0 or higher.
Workarounds
- Federation can be disabled by setting
federation_domain_whitelist
to an empty list ([]
).
References
For more information
If you have any questions or comments about this advisory, e-mail us at security@matrix.org.
References
- https://github.com/matrix-org/synapse/security/advisories/GHSA-jhjh-776m-4765
- https://github.com/matrix-org/synapse/pull/13087
- https://github.com/matrix-org/synapse/pull/13088
- https://github.com/matrix-org/synapse/releases/tag/v1.62.0
- https://nvd.nist.gov/vuln/detail/CVE-2022-31152
- https://github.com/pypa/advisory-database/tree/main/vulns/matrix-synapse/PYSEC-2022-262.yaml
- https://github.com/advisories/GHSA-jhjh-776m-4765