A logic error in the room key sharing functionality of matrix-js-sdk (aka Matrix Javascript SDK) before 12.4.1 allows a malicious Matrix homeserver present in an encrypted room to steal room encryption keys (via crafted Matrix protocol messages) that were originally sent by affected Matrix clients participating in that room. This allows the homeserver to decrypt end-to-end encrypted messages sent by affected clients.
References
Link | Resource |
---|---|
https://github.com/matrix-org/matrix-js-sdk/releases/tag/v12.4.1 | Third Party Advisory |
https://matrix.org/blog/2021/09/13/vulnerability-disclosure-key-sharing | Vendor Advisory |
https://github.com/matrix-org/matrix-js-sdk/releases/tag/v12.4.1 | Third Party Advisory |
https://matrix.org/blog/2021/09/13/vulnerability-disclosure-key-sharing | Vendor Advisory |
Configurations
History
21 Nov 2024, 06:24
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/matrix-org/matrix-js-sdk/releases/tag/v12.4.1 - Third Party Advisory | |
References | () https://matrix.org/blog/2021/09/13/vulnerability-disclosure-key-sharing - Vendor Advisory |
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-290 |
Information
Published : 2021-09-13 19:15
Updated : 2024-11-21 06:24
NVD link : CVE-2021-40823
Mitre link : CVE-2021-40823
CVE.ORG link : CVE-2021-40823
JSON object : View
Products Affected
matrix
- javascript_sdk
CWE
CWE-290
Authentication Bypass by Spoofing