matrix-js-sdk has insufficient MXC URI validation which allows client-side path traversal
Moderate severity
GitHub Reviewed
Published
Nov 12, 2024
in
matrix-org/matrix-js-sdk
•
Updated Nov 12, 2024
Description
Published by the National Vulnerability Database
Nov 12, 2024
Published to the GitHub Advisory Database
Nov 12, 2024
Reviewed
Nov 12, 2024
Last updated
Nov 12, 2024
Summary
matrix-js-sdk before 34.11.0 is vulnerable to client-side path traversal via crafted MXC URIs. A malicious room member can trigger clients based on the matrix-js-sdk to issue arbitrary authenticated GET requests to the client's homeserver.
Details
The Matrix specification demands homeservers to perform validation of the
server-name
andmedia-id
components of MXC URIs with the intent to prevent path traversal. However, it is not mentioned that a similar check must also be performed on the client to prevent client-side path traversal. matrix-js-sdk fails to perform this validation.Patches
Fixed in matrix-js-sdk 34.11.1.
Workarounds
None.
References
References