Search for packages
| purl | pkg:npm/matrix-react-sdk@3.22.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-1g1f-1x88-tbg5
Aliases: CVE-2023-30609 GHSA-xv83-x443-7rmw |
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') matrix-react-sdk is a react-based SDK for inserting a Matrix chat/VoIP client into a web page. Prior to version 3.71.0, plain text messages containing HTML tags are rendered as HTML in the search results. To exploit this, an attacker needs to trick a user into searching for a specific message containing an HTML injection payload. No cross-site scripting attack is possible due to the hardcoded content security policy. Version 3.71.0 of the SDK patches over the issue. As a workaround, restarting the client will clear the HTML injection. |
Affected by 3 other vulnerabilities. |
|
VCID-3s7z-6bqr-rqd1
Aliases: CVE-2023-28103 GHSA-6g43-88cp-w5gv |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') matrix-react-sdk is a Matrix chat protocol SDK for React Javascript. In certain configurations, data sent by remote servers containing special strings in key locations could cause modifications of the `Object.prototype`, disrupting matrix-react-sdk functionality, causing denial of service and potentially affecting program logic. This is fixed in matrix-react-sdk 3.69.0 and users are advised to upgrade. There are no known workarounds for this vulnerability. Note this advisory is distinct from GHSA-2x9c-qwgf-94xr which refers to a similar issue. |
Affected by 4 other vulnerabilities. |
|
VCID-e42f-h16f-gkbf
Aliases: CVE-2024-47824 GHSA-qcvh-p9jq-wp8v |
Malicious homeservers can steal message keys when the matrix-react-sdk user invites another user to a room ### Impact matrix-react-sdk before 3.102.0 allows a malicious homeserver to potentially steal message keys for a room when a user invites another user to that room, via injection of a malicious device controlled by the homeserver. This is possible because matrix-react-sdk before 3.102.0 shared historical message keys on invite. ### Patches matrix-react-sdk 3.102.0 [disables sharing message keys on invite](https://github.com/matrix-org/matrix-react-sdk/pull/12618) by removing calls to the vulnerable functionality. ### Workarounds None. ### References The vulnerability in matrix-react-sdk is caused by calling `MatrixClient.sendSharedHistoryKeys` in matrix-js-sdk, which is inherently vulnerable to this sort of attack. This matrix-js-sdk vulnerability is tracked as CVE-2024-47080 / [GHSA-4jf8-g8wp-cx7c](https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-4jf8-g8wp-cx7c). Given that this functionality is not specific to sharing message keys on *invite*, is optional, has to be explicitly called by the caller and has been independently patched in matrix-react-sdk by removing the offending calls, we believe it is proper to treat the matrix-react-sdk vulnerability as a separate one, with its own advisory and CVE. The matrix-org/matrix-react-sdk repository has recently been archived and the project was moved to [element-hq/matrix-react-sdk](https://github.com/element-hq/matrix-react-sdk). Given that this happened *after* the first patched release, no releases of the project on [element-hq/matrix-react-sdk](https://github.com/element-hq/matrix-react-sdk) were ever vulnerable to this vulnerability. Patching pull request: https://github.com/matrix-org/matrix-react-sdk/pull/12618. ### For more information If you have any questions or comments about this advisory, please email us at security at [security at matrix.org](mailto:security@matrix.org). |
Affected by 1 other vulnerability. |
|
VCID-k3ft-j7d1-nkh7
Aliases: CVE-2024-42347 GHSA-f83w-wqhc-cfp4 |
Matrix SDK for React's URL preview setting for a room is controllable by the homeserver ### Impact A malicious homeserver could manipulate a user's account data to cause the client to enable URL previews in end-to-end encrypted rooms, in which case any URLs in encrypted messages would be sent to the server. Even if the CVSS score would be 4.1 ([AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N&version=3.1)) the maintainer classifies this as High severity issue. ### Patches This was patched in matrix-react-sdk 3.105.1. ### Workarounds Deployments that trust their homeservers, as well as closed federations of trusted servers, are not affected. ### References N/A. |
Affected by 0 other vulnerabilities. |
|
VCID-ybpz-t956-k7fb
Aliases: CVE-2022-36060 GHSA-2x9c-qwgf-94xr |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') matrix-react-sdk is a Matrix chat protocol SDK for React Javascript. Events sent with special strings in key places can temporarily disrupt or impede the matrix-react-sdk from functioning properly, such as by causing room or event tile crashes. The remainder of the application can appear functional, though certain rooms/events will not be rendered. This issue has been fixed in matrix-react-sdk 3.53.0 and users are advised to upgrade. There are no known workarounds for this vulnerability. |
Affected by 5 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||