CVE-2020-26891

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-26891
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-26891.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-26891
Aliases
Related
Published
2020-10-19T17:15:13Z
Modified
2024-10-16T17:46:30.777917Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

AuthRestServlet in Matrix Synapse before 1.21.0 is vulnerable to XSS due to unsafe interpolation of the session GET parameter. This allows a remote attacker to execute an XSS attack on the domain Synapse is hosted on, by supplying the victim user with a malicious URL to the /matrix/client/r0/auth/*/fallback/web or /matrix/client/unstable/auth/*/fallback/web Synapse endpoints.

References

Affected packages

Debian:13 / matrix-synapse

Package

Name
matrix-synapse
Purl
pkg:deb/debian/matrix-synapse?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.21.1-1

Affected versions

0.*

0.19.2+dfsg-3
0.19.2+dfsg-4
0.19.2+dfsg-5
0.19.2+dfsg-6
0.24.0+dfsg-1
0.27.2+dfsg-1
0.28.0+dfsg-1
0.28.0+dfsg-2
0.28.1+dfsg-1
0.29.1+dfsg-1
0.30.0+dfsg-1
0.31.0+dfsg-1
0.31.0+dfsg-2
0.31.1+dfsg-1
0.31.1+dfsg-2
0.31.2+dfsg-1
0.32.2+dfsg-1
0.33.0+dfsg-1
0.33.1+dfsg-1
0.33.2+dfsg-1
0.33.2+dfsg-2
0.33.2+dfsg-3
0.33.3-1
0.33.3-2
0.33.3.1-1
0.33.4-1~bpo9+1
0.33.4-1
0.33.8-1
0.33.9-2~bpo9+1
0.33.9-2
0.34.0~rc2-1
0.34.0-1
0.34.0-2
0.34.0-3~bpo9+1
0.34.0-3~bpo9+2
0.34.0-3
0.34.1.1-1
0.34.1.1-2~bpo9+1
0.34.1.1-2
0.34.1.1-3~bpo9+1
0.34.1.1-3~bpo9+2
0.34.1.1-3
0.34.1.1-4
0.99.0-1~bpo9+1
0.99.0-1~bpo9+2
0.99.0-1~bpo9+3
0.99.0-1
0.99.1.1-1
0.99.2-1~bpo9+1
0.99.2-1~bpo9+2
0.99.2-1
0.99.2-2
0.99.2-3
0.99.2-4
0.99.2-5~bpo9+1
0.99.2-5
0.99.2-6
0.99.3.2-1
0.99.5.1-1
0.99.5.2-1

1.*

1.0.0-1
1.0.0-2~bpo10+1
1.0.0-2
1.1.0-1
1.2.1-1~bpo10+1
1.2.1-1~bpo10+2
1.2.1-1
1.2.1-2
1.3.0-1~bpo10+1
1.3.0-1
1.4.0~rc1-1
1.4.0-1
1.5.0~rc1-1
1.5.0-1
1.5.1-1~bpo10+1
1.5.1-1
1.6.0-1
1.6.1-1~bpo10+1
1.6.1-1
1.7.0-1
1.7.0-2
1.7.1-1
1.7.2-1~bpo10+1
1.7.2-1
1.7.3-1~bpo10+1
1.7.3-1
1.8.0-1
1.9.0-1~bpo10+1
1.9.0-1
1.9.1-1~bpo10+1
1.9.1-1
1.10.0-1
1.10.0-2
1.11.0-1
1.11.1-1~bpo10+1
1.11.1-1
1.12.0-1~bpo10+1
1.12.0-1
1.12.3-1~bpo10+1
1.12.3-1
1.12.4-1~bpo10+1
1.12.4-1
1.13.0-1~bpo10+1
1.13.0-1
1.15.0-1
1.15.1-1~bpo10+1
1.15.1-1~bpo10+2
1.15.1-1
1.15.2-1
1.16.0-1
1.17.0-1~bpo10+1
1.17.0-1
1.18.0-1~bpo10+1
1.18.0-1
1.19.0-1~bpo10+1
1.19.0-1
1.19.1-1~bpo10+1
1.19.1-1~bpo10+2
1.19.1-1~bpo10+3
1.19.1-1
1.19.2-1
1.19.3-1
1.20.0-1
1.20.1-1~bpo10+1
1.20.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}