Lucene search

K
githubGitHub Advisory DatabaseGHSA-C9VX-2G7W-RP65
HistoryJul 18, 2023 - 4:58 p.m.

matrix-react-sdk vulnerable to XSS in Export Chat feature

2023-07-1816:58:01
CWE-79
CWE-80
GitHub Advisory Database
github.com
9
vulnerable
export chat feature
stored xss
impact
malicious homeserver
patched

6.1 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N

0.0005 Low

EPSS

Percentile

17.9%

Description

The Export Chat feature includes certain attacker-controlled elements in the generated document without sufficient escaping, leading to stored XSS.

Impact

Since the Export Chat feature generates a separate document, an attacker can only inject code run from the null origin, restricting the impact.

However, the attacker can still potentially use the XSS to leak message contents. A malicious homeserver is a potential attacker since the affected inputs are controllable server-side.

Patches

This was patched in matrix-react-sdk 3.76.0.

Workarounds

None, other than not using the Export Chat feature.

References

N/A

Affected configurations

Vulners
Node
matrix-react-sdk_projectmatrix-react-sdkRange<3.76.0node.js
CPENameOperatorVersion
matrix-react-sdklt3.76.0

6.1 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N

0.0005 Low

EPSS

Percentile

17.9%