GHSA-wmg4-8cp2-hpg9

Suggest an improvement
Source
https://github.com/advisories/GHSA-wmg4-8cp2-hpg9
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/04/GHSA-wmg4-8cp2-hpg9/GHSA-wmg4-8cp2-hpg9.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-wmg4-8cp2-hpg9
Aliases
Published
2021-04-19T14:54:04Z
Modified
2024-09-24T16:03:49.635001Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
  • 8.7 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
Sydent vulnerable to denial of service attack via memory exhaustion
Details

Impact

Sydent does not limit the size of requests it receives from HTTP clients. A malicious user could send an HTTP request with a very large body, leading to disk space exhaustion and denial of service.

Sydent also does not limit response size for requests it makes to remote Matrix homeservers. A malicious homeserver could return a very large response, again leading to memory exhaustion and denial of service.

This affects any server which accepts registration requests from untrusted clients.

Patches

Patched by 89071a1, 0523511, f56eee3.

Workarounds

Request sizes can be limited in an HTTP reverse-proxy.

There are no known workarounds for the problem with overlarge responses.

For more information

If you have any questions or comments about this advisory, email us at security@matrix.org.

Database specific
{
    "nvd_published_at": "2021-04-15T21:15:00Z",
    "cwe_ids": [
        "CWE-20",
        "CWE-400",
        "CWE-770"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2021-04-15T20:49:34Z"
}
References

Affected packages

PyPI / matrix-sydent

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.3.0

Affected versions

2.*

2.0.0
2.0.1
2.1.0
2.2.0