CVE-2024-47824

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-47824
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-47824.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-47824
Aliases
Published
2024-10-15T15:40:37Z
Modified
2025-10-20T20:28:56.221512Z
Severity
  • 8.7 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
Malicious homeservers can steal message keys when the matrix-react-sdk user invites another user to a room
Details

matrix-react-sdk is react-based software development kit for inserting a Matrix chat/VOIP client into a web page. Starting in version 3.18.0 and before 3.102.0, matrix-react-sdk allows a malicious homeserver to potentially steal message keys for a room when a user invites another user to that room, via injection of a malicious device controlled by the homeserver. This is possible because matrix-react-sdk before 3.102.0 shared historical message keys on invite. Version 3.102.0 fixes this issue by disabling sharing message keys on invite by removing calls to the vulnerable functionality. No known workarounds are available.

Database specific
{
    "cwe_ids": [
        "CWE-200"
    ]
}
References

Affected packages

Git / github.com/matrix-org/matrix-react-sdk

Affected ranges

Type
GIT
Repo
https://github.com/matrix-org/matrix-react-sdk
Events

Affected versions

Other

no-media-devices-release

v3.*

v3.100.0
v3.100.0-rc.0
v3.100.0-rc.1
v3.101.0
v3.101.0-rc.0
v3.101.0-rc.1
v3.102.0-rc.0
v3.102.0-rc.1
v3.18.0
v3.19.0
v3.19.0-rc.1
v3.20.0
v3.20.0-rc.1
v3.21.0
v3.21.0-rc.1
v3.22.0
v3.22.0-rc.1
v3.23.0
v3.23.0-rc.1
v3.24.0
v3.24.0-rc.1
v3.25.0
v3.25.0-rc.1
v3.26.0
v3.26.0-rc.1
v3.27.0
v3.27.0-rc.1
v3.28.0
v3.28.0-rc.1
v3.28.1
v3.29.0
v3.29.0-rc.1
v3.29.0-rc.2
v3.29.0-rc.3
v3.29.1
v3.30.0
v3.30.0-rc.1
v3.30.0-rc.2
v3.31.0
v3.31.0-rc.1
v3.31.0-rc.2
v3.32.0
v3.32.0-rc.1
v3.32.0-rc.2
v3.32.1
v3.33.0
v3.33.0-rc.1
v3.33.0-rc.2
v3.34.0
v3.34.0-rc.1
v3.35.0
v3.35.0-rc.1
v3.35.1
v3.36.0
v3.36.0-rc.1
v3.36.1
v3.37.0
v3.37.0-rc.1
v3.38.0
v3.38.0-rc.1
v3.39.0
v3.39.0-rc.1
v3.39.0-rc.2
v3.39.1
v3.40.0
v3.40.0-rc.1
v3.40.0-rc.2
v3.40.1
v3.41.0
v3.41.0-rc.1
v3.41.1
v3.42.0
v3.42.0-rc.1
v3.42.1
v3.42.1-rc.1
v3.42.2-rc.1
v3.42.3
v3.42.4
v3.43.0
v3.43.0-rc.1
v3.44.0
v3.44.0-rc.1
v3.44.0-rc.2
v3.45.0
v3.45.0-rc.1
v3.45.0-rc.2
v3.45.0-rc.3
v3.46.0
v3.46.0-rc.1
v3.47.0
v3.48.0
v3.48.0-rc.1
v3.49.0
v3.49.0-rc.1
v3.49.0-rc.2
v3.50.0
v3.51.0
v3.51.0-rc.1
v3.52.0
v3.52.0-rc.1
v3.52.0-rc.2
v3.53.0
v3.53.0-rc.1
v3.53.0-rc.2
v3.54.0
v3.54.0-rc.1
v3.55.0
v3.55.0-rc.1
v3.56.0
v3.57.0
v3.58.0
v3.58.0-rc.1
v3.58.0-rc.2
v3.58.1
v3.59.0
v3.59.0-rc.1
v3.59.0-rc.2
v3.59.1
v3.60.0
v3.60.0-rc.1
v3.60.0-rc.2
v3.61.0
v3.61.0-rc.1
v3.62.0
v3.62.0-rc.1
v3.62.0-rc.2
v3.63.0
v3.63.0-rc.1
v3.63.0-rc.2
v3.64.0
v3.64.0-rc.1
v3.64.0-rc.2
v3.64.0-rc.3
v3.64.0-rc.4
v3.64.1
v3.64.2
v3.65.0
v3.65.0-rc.1
v3.66.0
v3.66.0-rc.1
v3.67.0
v3.67.0-rc.1
v3.67.0-rc.2
v3.68.0
v3.68.0-rc.1
v3.68.0-rc.2
v3.68.0-rc.3
v3.69.0
v3.69.1
v3.70.0
v3.70.0-rc.1
v3.71.0
v3.71.0-rc.1
v3.71.1
v3.72.0
v3.72.0-rc.1
v3.72.0-rc.2
v3.73.0
v3.73.0-rc.1
v3.73.0-rc.2
v3.73.0-rc.3
v3.73.1
v3.74.0
v3.74.0-rc1
v3.75.0
v3.75.0-no-media-devices-hotfix
v3.75.0-rc.1
v3.76.0
v3.76.0-rc.1
v3.76.0-rc.2
v3.77.0
v3.77.0-rc.1
v3.77.1
v3.78.0
v3.78.0-rc.1
v3.79.0
v3.79.0-rc.1
v3.79.0-rc.2
v3.80.0
v3.80.0-rc.1
v3.80.0-rc.2
v3.80.1
v3.81.0
v3.81.0-rc.1
v3.81.1
v3.82.0
v3.82.0-rc.1
v3.83.0
v3.83.0-rc.1
v3.84.0
v3.84.0-rc.1
v3.84.1
v3.85.0
v3.85.0-rc.0
v3.85.0-rc.1
v3.86.0
v3.86.0-rc.0
v3.86.0-rc.1
v3.86.0-rc.2
v3.87.0
v3.87.0-rc.0
v3.88.0
v3.89.0
v3.89.0-rc.0
v3.90.0
v3.91.0
v3.91.0-rc.0
v3.91.0-rc.1
v3.92.0
v3.92.0-rc.0
v3.92.0-rc.1
v3.93.0
v3.93.0-rc.0
v3.94.0
v3.94.0-rc.0
v3.95.0
v3.95.0-rc.0
v3.96.0
v3.96.0-rc.0
v3.96.1
v3.97.0
v3.97.0-rc.0
v3.98.0
v3.98.0-rc.0
v3.99.0
v3.99.0-rc.0
v3.99.0-rc.1