Matrix Synapse APIs prone to attack

Overview :
Matrix Synapse before 1.5.0 mishandles signature checking on some federation APIs.
Affected Product(s) :
  • Matrix Synapse before 1.5.0
Vulnerability Details :
CVE ID : CVE-2019-18835
  Events sent over /send_join, /send_leave, and /invite may not be correctly signed, or may not come from the expected servers.

Solution :

Update to Matrix Synapse 1.5.0

 

Common Vulnerabilityies and Exposures

Contact us to get started

CVE-2024-57903 : LINUX KERNEL UP TO 5.15.175/6.1.123/6.6.69/6.12.8 IN_ATOMIC STACK-BASED OVERFLOW

CVE-2024-57903 : LINUX KERNEL UP TO 5.15.175/6.1.123/6.6.69/6.12.8 IN_ATOMIC STACK-BASED OVERFLOW

Description In the Linux kernel, the following vulnerability has been resolved: net: restrict SO_REUSEPORT to inet sockets After blamed commit,

CVE-2024-12867 : ARCTIC SECURITY ARCTIC HUB UP TO 5.5.1872 CONFIGURATION SERVER-SIDE REQUEST FORGERY

CVE-2024-12867 : ARCTIC SECURITY ARCTIC HUB UP TO 5.5.1872 CONFIGURATION SERVER-SIDE REQUEST FORGERY

Description Server-Side Request Forgery in URL Mapper in Arctic Security’s Arctic Hub versions 3.0.1764-5.6.1877 allows an unauthenticated remote attacker to

CVE-2024-12840 : RED HAT SATELLITE HTTP PROXY SERVER-SIDE REQUEST FORGERY

CVE-2024-12840 : RED HAT SATELLITE HTTP PROXY SERVER-SIDE REQUEST FORGERY

Description A server-side request forgery exists in Satellite. When a PUT HTTP request is made to /http_proxies/test_connection, when supplied with