Search for vulnerabilities
Vulnerability details: VCID-gutu-2p41-h7hg
Vulnerability ID VCID-gutu-2p41-h7hg
Aliases CVE-2024-50336
GHSA-xvg8-m4x3-w6xr
Summary matrix-js-sdk has insufficient MXC URI validation which allows client-side path traversal ### Summary matrix-js-sdk before 34.11.0 is vulnerable to client-side path traversal via crafted MXC URIs. A malicious room member can trigger clients based on the matrix-js-sdk to issue arbitrary authenticated GET requests to the client's homeserver. ### Details The Matrix specification demands homeservers to [perform validation](https://spec.matrix.org/v1.12/client-server-api/#security-considerations-5) of the `server-name` and `media-id` components of MXC URIs with the intent to prevent path traversal. However, it is not mentioned that a similar check must also be performed on the client to prevent *client-side* path traversal. matrix-js-sdk fails to perform this validation. ### Patches Fixed in matrix-js-sdk 34.11.1. ### Workarounds None. ### References - https://spec.matrix.org/v1.12/client-server-api/#security-considerations-5 - https://blog.doyensec.com/2024/07/02/cspt2csrf.html
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00124 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00124 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00124 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00124 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00124 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00124 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00124 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00124 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00124 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00124 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00124 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00129 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00138 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00142 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00158 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.0017 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.0017 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.0017 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.0017 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.0017 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.0017 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.0017 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2024-50336
cvssv3.1 4.3 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-xvg8-m4x3-w6xr
generic_textual MODERATE https://github.com/matrix-org/matrix-js-sdk
cvssv3.1_qr MODERATE https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-xvg8-m4x3-w6xr
cvssv4 5.3 https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-xvg8-m4x3-w6xr
generic_textual MODERATE https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-xvg8-m4x3-w6xr
ssvc Track https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-xvg8-m4x3-w6xr
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2024-50336
cvssv4 5.3 https://spec.matrix.org/v1.12/client-server-api/#security-considerations-5
generic_textual MODERATE https://spec.matrix.org/v1.12/client-server-api/#security-considerations-5
ssvc Track https://spec.matrix.org/v1.12/client-server-api/#security-considerations-5
generic_textual none https://www.mozilla.org/en-US/security/advisories/mfsa2024-69
generic_textual high https://www.mozilla.org/en-US/security/advisories/mfsa2025-04
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N Found at https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-xvg8-m4x3-w6xr
Attack Vector (AV) Attack Complexity (AC) Attack Requirements (AT) Privileges Required (PR) User Interaction (UI) Vulnerable System Impact Confidentiality (VC) Vulnerable System Impact Integrity (VI) Vulnerable System Impact Availability (VA) Subsequent System Impact Confidentiality (SC) Subsequent System Impact Integrity (SI) Subsequent System Impact Availability (SA)

network

adjacent

local

physical

low

high

none

present

none

low

high

none

passive

active

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-12T17:11:23Z/ Found at https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-xvg8-m4x3-w6xr
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N Found at https://spec.matrix.org/v1.12/client-server-api/#security-considerations-5
Attack Vector (AV) Attack Complexity (AC) Attack Requirements (AT) Privileges Required (PR) User Interaction (UI) Vulnerable System Impact Confidentiality (VC) Vulnerable System Impact Integrity (VI) Vulnerable System Impact Availability (VA) Subsequent System Impact Confidentiality (SC) Subsequent System Impact Integrity (SI) Subsequent System Impact Availability (SA)

network

adjacent

local

physical

low

high

none

present

none

low

high

none

passive

active

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-12T17:11:23Z/ Found at https://spec.matrix.org/v1.12/client-server-api/#security-considerations-5
Exploit Prediction Scoring System (EPSS)
Percentile 0.11755
EPSS Score 0.00044
Published At Nov. 18, 2024, midnight
Date Actor Action Source VulnerableCode Version
2024-11-19T00:42:49.120604+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/11/GHSA-xvg8-m4x3-w6xr/GHSA-xvg8-m4x3-w6xr.json 34.3.2