CVE-2019-5885: Matrix Synapse Predictable Secret Key
(updated )
Matrix Synapse before 0.34.0.1, when the macaroon_secret_key
authentication parameter is not set, uses a predictable value to derive a secret key and other secrets which could allow remote attackers to impersonate users.
References
- github.com/advisories/GHSA-jrqm-v8cv-53ww
- github.com/matrix-org/synapse
- github.com/matrix-org/synapse/blob/67f9e5293ea6650b2ec284c0b7503f3f3eade94b/docs/changelogs/CHANGES-pre-1.0.md?plain=1
- github.com/matrix-org/synapse/issues/4664
- github.com/matrix-org/synapse/pull/4315
- github.com/matrix-org/synapse/pull/4373
- github.com/pypa/advisory-database/tree/main/vulns/matrix-synapse/PYSEC-2019-187.yaml
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/32Y6KD3OAHCG5P33HC2QEX3NUZOSXCGZ
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VMCLO5PUPBA756UKY72PKUWL4RRM4W6K
- matrix.org/blog/2019/01/10/critical-security-update-synapse-0-34-0-1-synapse-0-34-1-1
- matrix.org/blog/2019/01/15/further-details-on-critical-security-update-in-synapse-affecting-all-versions-prior-to-0-34-1-cve-2019-5885
- nvd.nist.gov/vuln/detail/CVE-2019-5885
Detect and mitigate CVE-2019-5885 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →