8.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
0.001 Low
EPSS
Percentile
45.5%
Matrix JavaScript SDK is the Matrix Client-Server software development kit
(SDK) for JavaScript. Prior to version 19.7.0, an attacker cooperating with
a malicious homeserver could interfere with the verification flow between
two users, injecting its own cross-signing user identity in place of one of
the usersβ identities. This would lead to the other device
trusting/verifying the user identity under the control of the homeserver
instead of the intended one. The vulnerability is a bug in the
matrix-js-sdk, caused by checking and signing user identities and devices
in two separate steps, and inadequately fixing the keys to be signed
between those steps. Even though the attack is partly made possible due to
the design decision of treating cross-signing user identities as Matrix
devices on the server side (with their device ID set to the public part of
the user identity key), no other examined implementations were vulnerable.
Starting with version 19.7.0, the matrix-js-sdk has been modified to double
check that the key signed is the one that was verified instead of just
referencing the key by ID. An additional check has been made to report an
error when one of the device ID matches a cross-signing key. As this attack
requires coordination between a malicious homeserver and an attacker, those
who trust their homeservers do not need a particular workaround.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | node-matrix-js-sdk | <Β any | UNKNOWN |
ubuntu | 22.04 | noarch | node-matrix-js-sdk | <Β any | UNKNOWN |
ubuntu | 23.10 | noarch | node-matrix-js-sdk | <Β any | UNKNOWN |
ubuntu | 24.04 | noarch | node-matrix-js-sdk | <Β any | UNKNOWN |
ubuntu | 18.04 | noarch | thunderbird | <Β 1:102.4.2+build2-0ubuntu0.18.04.1 | UNKNOWN |
ubuntu | 20.04 | noarch | thunderbird | <Β 1:102.4.2+build2-0ubuntu0.20.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | thunderbird | <Β 1:102.4.2+build2-0ubuntu0.22.04.1 | UNKNOWN |
ubuntu | 22.10 | noarch | thunderbird | <Β 1:102.4.2+build2-0ubuntu0.22.10.1 | UNKNOWN |
github.com/matrix-org/matrix-js-sdk/commit/a587d7c36026fe1fcf93dfff63588abee359be76
github.com/matrix-org/matrix-js-sdk/releases/tag/v19.7.0
github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-5w8r-8pgj-5jmf
launchpad.net/bugs/cve/CVE-2022-39250
matrix.org/blog/2022/09/28/upgrade-now-to-address-encryption-vulns-in-matrix-sdks-and-clients
nvd.nist.gov/vuln/detail/CVE-2022-39250
security-tracker.debian.org/tracker/CVE-2022-39250
ubuntu.com/security/notices/USN-5724-1
www.cve.org/CVERecord?id=CVE-2022-39250