We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-42347

URL preview setting for a room is controllable by the homeserver in matrix-react-sdk



Description

matrix-react-sdk is a react-based SDK for inserting a Matrix chat/voip client into a web page. A malicious homeserver could manipulate a user's account data to cause the client to enable URL previews in end-to-end encrypted rooms, in which case any URLs in encrypted messages would be sent to the server. This was patched in matrix-react-sdk 3.105.0. Deployments that trust their homeservers, as well as closed federations of trusted servers, are not affected. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Reserved 2024-07-30 | Published 2024-08-06 | Updated 2024-08-08 | Assigner GitHub_M


HIGH: 7.7CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

Problem types

CWE-359: Exposure of Private Personal Information to an Unauthorized Actor

Product status

< 3.105.1
affected

References

github.com/...ct-sdk/security/advisories/GHSA-f83w-wqhc-cfp4

github.com/matrix-org/matrix-react-sdk/releases/tag/v3.105.1

cve.org (CVE-2024-42347)

nvd.nist.gov (CVE-2024-42347)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-42347

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.