CVE-2022-39374

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-39374
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-39374.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-39374
Aliases
Downstream
Published
2023-05-26T13:44:44.113Z
Modified
2025-11-28T04:55:36.308431Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Synapse Denial of service due to incorrect application of event authorization rules during state resolution
Details

Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foundation. If Synapse and a malicious homeserver are both joined to the same room, the malicious homeserver can trick Synapse into accepting previously rejected events into its view of the current state of that room. This can be exploited in a way that causes all further messages and state changes sent in that room from the vulnerable homeserver to be rejected. This issue has been patched in version 1.68.0

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-400"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/39xxx/CVE-2022-39374.json"
}
References

Affected packages

Git / github.com/matrix-org/synapse

Affected ranges

Type
GIT
Repo
https://github.com/matrix-org/synapse
Events

Affected versions

v1.*

v1.62.0
v1.63.0
v1.63.0rc1
v1.63.1
v1.64.0
v1.64.0rc1
v1.64.0rc2
v1.65.0
v1.65.0rc1
v1.65.0rc2
v1.66.0
v1.66.0rc1
v1.66.0rc2
v1.67.0
v1.67.0rc1
v1.68.0rc1
v1.68.0rc2