We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-42347

URL preview setting for a room is controllable by the homeserver in matrix-react-sdk



AssignerGitHub_M
Reserved2024-07-30
Published2024-08-06
Updated2024-08-08

Description

matrix-react-sdk is a react-based SDK for inserting a Matrix chat/voip client into a web page. A malicious homeserver could manipulate a user's account data to cause the client to enable URL previews in end-to-end encrypted rooms, in which case any URLs in encrypted messages would be sent to the server. This was patched in matrix-react-sdk 3.105.0. Deployments that trust their homeservers, as well as closed federations of trusted servers, are not affected. Users are advised to upgrade. There are no known workarounds for this vulnerability.



HIGH: 7.7CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

Problem types

CWE-359: Exposure of Private Personal Information to an Unauthorized Actor

Product status

< 3.105.1
affected

References

https://github.com/matrix-org/matrix-react-sdk/security/advisories/GHSA-f83w-wqhc-cfp4

https://github.com/matrix-org/matrix-react-sdk/releases/tag/v3.105.1

cve.org CVE-2024-42347

nvd.nist.gov CVE-2024-42347

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-42347
Subscribe to our newsletter to learn more about our work.