Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: matrix-continuwuity

Found 1 matching suggestions

View:
Compact
Detailed
updated 1 month, 2 weeks ago by @jopejoe1 Activity log
  • Created automatic suggestion
  • @jopejoe1 dismissed
Improper Validation in Conduit-derived homeservers resulting in Unintended Proxy or Intermediary ('Confused Deputy')

continuwuity is a Matrix homeserver written in Rust. This vulnerability allows an attacker with a malicious remote server to cause the local server to sign an arbitrary event upon user interaction. Upon a user account leaving a room (rejecting an invite), joining a room or knocking on a room, the victim server may ask a remote server for assistance. If the victim asks the attacker server for assistance the attacker is able to provide an arbitrary event, which the victim will sign and return to the attacker. For the /leave endpoint, this works for any event with a supported room version, where the origin and origin_server_ts is set by the victim. For the /join endpoint, an additionally victim-set content field in the format of a join membership is needed. For the /knock endpoint, an additional victim-set content field in the format of a knock membership and a room version not between 1 and 6 is needed. This was exploited as a part of a larger chain against the continuwuity.org homeserver. This vulnerability affects all Conduit-derived servers. This vulnerability is fixed in Continuwuity 0.5.1, Conduit 0.10.11, Grapevine 0aae932b, and Tuwunel 1.4.9.

Affected products

continuwuity
  • ==< 0.5.1

Matching in nixpkgs

Package maintainers

Already fixed in all supported channels

continuwuity: https://github.com/NixOS/nixpkgs/commit/085ce9e763f84d87e6c59bf7c2423b4eab97c5ea
conduit: https://github.com/NixOS/nixpkgs/commit/05eb51d70b6f57696fa61c714d2264057b64f98a
tuwunel: https://github.com/NixOS/nixpkgs/commit/e9bc0bead84c1a7ea6191ceda3ba3eda3196ca7a