3.1
CVSSv3

CVE-2021-39164

Published: 31/08/2021 Updated: 07/11/2023
CVSS v2 Base Score: 3.5 | Impact Score: 2.9 | Exploitability Score: 6.8
CVSS v3 Base Score: 3.1 | Impact Score: 1.4 | Exploitability Score: 1.6
VMScore: 312
Vector: AV:N/AC:M/Au:S/C:P/I:N/A:N

Vulnerability Summary

Matrix is an ecosystem for open federated Instant Messaging and Voice over IP. In versions 1.41.0 and prior, unauthorised users can access the membership (list of members, with their display names) of a room if they know the ID of the room. The vulnerability is limited to rooms with `shared` history visibility. Furthermore, the unauthorised user must be using an account on a vulnerable homeserver that is in the room. Server administrators should upgrade to 1.41.1 or later in order to receive the patch. One workaround is available. Administrators of servers that use a reverse proxy could, with potentially unacceptable loss of functionality, block the endpoints: `/_matrix/client/r0/rooms/{room_id}/members` with `at` query parameter, and `/_matrix/client/unstable/rooms/{room_id}/members` with `at` query parameter.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

matrix synapse

fedoraproject fedora 34

fedoraproject fedora 35

Vendor Advisories

In matrix-synapse versions 1410 and prior, unauthorised users can access the membership (list of members, with their display names) of a room if they know the ID of the room The vulnerability is limited to rooms with `shared` history visibility Furthermore, the unauthorised user must be using an account on a vulnerable homeserver that is in the ...