CVE-2023-43796

Synapse is an open-source Matrix homeserver Prior to versions 1.95.1 and 1.96.0rc1, cached device information of remote users can be queried from Synapse. This can be used to enumerate the remote users known to a homeserver. System administrators are encouraged to upgrade to Synapse 1.95.1 or 1.96.0rc1 to receive a patch. As a workaround, the `federation_domain_whitelist` can be used to limit federation traffic with a homeserver.
Configurations

Configuration 1 (hide)

cpe:2.3:a:matrix:synapse:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*

History

21 Nov 2024, 08:24

Type Values Removed Values Added
References () https://github.com/matrix-org/synapse/commit/daec55e1fe120c564240c5386e77941372bf458f - Patch () https://github.com/matrix-org/synapse/commit/daec55e1fe120c564240c5386e77941372bf458f - Patch
References () https://github.com/matrix-org/synapse/security/advisories/GHSA-mp92-3jfm-3575 - Vendor Advisory () https://github.com/matrix-org/synapse/security/advisories/GHSA-mp92-3jfm-3575 - Vendor Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2IDEEZMFJBDLTFHQUTZRJJNCOZGQ2ZVS/ - Mailing List () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2IDEEZMFJBDLTFHQUTZRJJNCOZGQ2ZVS/ - Mailing List
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VH3RNC5ZPQZ4OKPSL4E6BBJSZOQLGDEY/ - Mailing List () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VH3RNC5ZPQZ4OKPSL4E6BBJSZOQLGDEY/ - Mailing List
References () https://security.gentoo.org/glsa/202401-12 - () https://security.gentoo.org/glsa/202401-12 -

07 Jan 2024, 11:15

Type Values Removed Values Added
References
  • () https://security.gentoo.org/glsa/202401-12 -

28 Dec 2023, 16:13

Type Values Removed Values Added
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2IDEEZMFJBDLTFHQUTZRJJNCOZGQ2ZVS/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2IDEEZMFJBDLTFHQUTZRJJNCOZGQ2ZVS/ - Mailing List
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VH3RNC5ZPQZ4OKPSL4E6BBJSZOQLGDEY/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VH3RNC5ZPQZ4OKPSL4E6BBJSZOQLGDEY/ - Mailing List
First Time Fedoraproject fedora
Fedoraproject
CPE cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*

10 Nov 2023, 03:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VH3RNC5ZPQZ4OKPSL4E6BBJSZOQLGDEY/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2IDEEZMFJBDLTFHQUTZRJJNCOZGQ2ZVS/ -

08 Nov 2023, 17:59

Type Values Removed Values Added
CWE CWE-200 NVD-CWE-noinfo
CPE cpe:2.3:a:matrix:synapse:*:*:*:*:*:*:*:*
References (MISC) https://github.com/matrix-org/synapse/security/advisories/GHSA-mp92-3jfm-3575 - (MISC) https://github.com/matrix-org/synapse/security/advisories/GHSA-mp92-3jfm-3575 - Vendor Advisory
References (MISC) https://github.com/matrix-org/synapse/commit/daec55e1fe120c564240c5386e77941372bf458f - (MISC) https://github.com/matrix-org/synapse/commit/daec55e1fe120c564240c5386e77941372bf458f - Patch
First Time Matrix
Matrix synapse
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3

31 Oct 2023, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-10-31 17:15

Updated : 2024-11-21 08:24


NVD link : CVE-2023-43796

Mitre link : CVE-2023-43796

CVE.ORG link : CVE-2023-43796


JSON object : View

Products Affected

fedoraproject

  • fedora

matrix

  • synapse
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

NVD-CWE-noinfo