GHSA-JRH7-MHHX-6H88
Vulnerability from github – Published: 2021-04-13 15:12 – Updated: 2024-09-30 20:39
VLAI?
Summary
Denial of service (via resource exhaustion) due to improper input validation on groups/communities endpoints
Details
Impact
Missing input validation of some parameters on the groups (also known as communities) endpoints could cause excessive use of disk space and memory leading to resource exhaustion. Additionally clients may have issues rendering large fields.
Patches
This issue is fixed by #9321 and #9393.
Workarounds
The groups feature can be disabled (by setting enable_group_creation to False) to mitigate this issue. Note that it is disabled by default.
Other information
Note that the groups feature is not part of the Matrix specification and the chosen maximum lengths are arbitrary. Not all clients might abide by them.
Severity ?
5.3 (Medium)
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "matrix-synapse"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.28.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2021-21393"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": true,
"github_reviewed_at": "2021-04-12T20:48:55Z",
"nvd_published_at": "2021-04-12T22:15:00Z",
"severity": "MODERATE"
},
"details": "### Impact\nMissing input validation of some parameters on the groups (also known as communities) endpoints could cause excessive use of disk space and memory leading to resource exhaustion. Additionally clients may have issues rendering large fields.\n\n### Patches\nThis issue is fixed by #9321 and #9393.\n\n### Workarounds\nThe groups feature can be disabled (by setting `enable_group_creation` to `False`) to mitigate this issue. Note that it is disabled by default.\n\n### Other information\nNote that the groups feature is not part of the [Matrix specification](https://matrix.org/docs/spec/) and the chosen maximum lengths are arbitrary. Not all clients might abide by them.",
"id": "GHSA-jrh7-mhhx-6h88",
"modified": "2024-09-30T20:39:15Z",
"published": "2021-04-13T15:12:40Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/matrix-org/synapse/security/advisories/GHSA-jrh7-mhhx-6h88"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21393"
},
{
"type": "WEB",
"url": "https://github.com/matrix-org/synapse/pull/9321"
},
{
"type": "WEB",
"url": "https://github.com/matrix-org/synapse/pull/9393"
},
{
"type": "WEB",
"url": "https://github.com/matrix-org/synapse/commit/3f58fc848d0002de4605bed91603a1f9f245d128"
},
{
"type": "WEB",
"url": "https://github.com/matrix-org/synapse/commit/d2f0ec12d5c8f113095408888e87e191ac546499"
},
{
"type": "PACKAGE",
"url": "https://github.com/matrix-org/synapse"
},
{
"type": "WEB",
"url": "https://github.com/pypa/advisory-database/tree/main/vulns/matrix-synapse/PYSEC-2021-26.yaml"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY"
},
{
"type": "WEB",
"url": "https://pypi.org/project/matrix-synapse"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "Denial of service (via resource exhaustion) due to improper input validation on groups/communities endpoints"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…