CVE-2022-31052: URL previews of unusual or maliciously-crafted pages can crash Synapse media repositories or Synapse monoliths
(updated )
URL previews of some web pages can exhaust the available stack space for the Synapse process due to unbounded recursion. This is sometimes recoverable and leads to an error for the request causing the problem, but in other cases the Synapse process may crash altogether.
It is possible to exploit this maliciously, either by malicious users on the homeserver, or by remote users sending URLs that a local user’s client may automatically request a URL preview for. Remote users are not able to exploit this directly, because the URL preview endpoint is authenticated.
References
- github.com/advisories/GHSA-22p3-qrh9-cx32
- github.com/matrix-org/synapse
- github.com/matrix-org/synapse/commit/fa1308061802ac7b7d20e954ba7372c5ac292333
- github.com/matrix-org/synapse/security/advisories/GHSA-22p3-qrh9-cx32
- github.com/pypa/advisory-database/tree/main/vulns/matrix-synapse/PYSEC-2022-224.yaml
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EARKKJZ2W7WUITFDT4EG4NVATFYJQHF
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGSDQ4YAITCUACAB7SXQZDJIU3IQ4CJD
- nvd.nist.gov/vuln/detail/CVE-2022-31052
- spec.matrix.org/v1.2/client-server-api/
Detect and mitigate CVE-2022-31052 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →