Arch Linux Security Advisory ASA-202106-51
=========================================
Severity: Medium
Date    : 2021-06-22
CVE-ID  : CVE-2021-32659
Package : matrix-appservice-irc
Type    : insufficient validation
Remote  : Yes
Link    : https://security.archlinux.org/AVG-2076

Summary
======
The package matrix-appservice-irc before version 0.27.0-1 is vulnerable
to insufficient validation.

Resolution
=========
Upgrade to 0.27.0-1.

# pacman -Syu "matrix-appservice-irc>=0.27.0-1"

The problem has been fixed upstream in version 0.27.0.

Workaround
=========
As a workaround, disabling the automatic room upgrade handling can be
done by removing the `roomUpgradeOpts` key from the `Bridge` class
options.

Description
==========
In versions 2.6.0 and earlier of matrix-appservice-bridge, as included
in matrix-appservice-irc before version 0.27.0, if a bridge has room
upgrade handling turned on in the configuration (the `roomUpgradeOpts`
key when instantiating a new `Bridge` instance.), any
`m.room.tombstone` event it encounters will be used to unbridge the
current room and bridge into the target room. However, the target room
`m.room.create` event is not checked to verify if the `predecessor`
field contains the previous room. This means that any malicious admin
of a bridged room can repoint the traffic to a different room without
the new room being aware. Versions 2.6.1 and greater are patched. As a
workaround, disabling the automatic room upgrade handling can be done
by removing the `roomUpgradeOpts` key from the `Bridge` class options.

Impact
=====
A malicious admin of a bridged room can repoint the traffic to a
different room without the new room being aware.

References
=========
https://github.com/matrix-org/matrix-appservice-bridge/security/advisories/GHSA-35g4-qx3c-vjhx
https://github.com/matrix-org/matrix-appservice-irc/releases/tag/0.27.0
https://github.com/matrix-org/matrix-appservice-bridge/pull/330
https://github.com/matrix-org/matrix-appservice-bridge/commit/b69e745584a34fcfd858df33e4631e420da07b9f
https://security.archlinux.org/CVE-2021-32659

ArchLinux: 202106-51: matrix-appservice-irc: insufficient validation

June 24, 2021

Summary

In versions 2.6.0 and earlier of matrix-appservice-bridge, as included in matrix-appservice-irc before version 0.27.0, if a bridge has room upgrade handling turned on in the configuration (the `roomUpgradeOpts` key when instantiating a new `Bridge` instance.), any `m.room.tombstone` event it encounters will be used to unbridge the current room and bridge into the target room. However, the target room `m.room.create` event is not checked to verify if the `predecessor` field contains the previous room. This means that any malicious admin of a bridged room can repoint the traffic to a different room without the new room being aware. Versions 2.6.1 and greater are patched. As a workaround, disabling the automatic room upgrade handling can be done by removing the `roomUpgradeOpts` key from the `Bridge` class options.

Resolution

Upgrade to 0.27.0-1. # pacman -Syu "matrix-appservice-irc>=0.27.0-1"
The problem has been fixed upstream in version 0.27.0.

References

https://github.com/matrix-org/matrix-appservice-bridge/security/advisories/GHSA-35g4-qx3c-vjhx https://github.com/matrix-org/matrix-appservice-irc/releases/tag/0.27.0 https://github.com/matrix-org/matrix-appservice-bridge/pull/330 https://github.com/matrix-org/matrix-appservice-bridge/commit/b69e745584a34fcfd858df33e4631e420da07b9f https://security.archlinux.org/CVE-2021-32659

Severity
Package : matrix-appservice-irc
Type : insufficient validation
Remote : Yes
Link : https://security.archlinux.org/AVG-2076

Workaround

As a workaround, disabling the automatic room upgrade handling can bedone by removing the `roomUpgradeOpts` key from the `Bridge` classoptions.

Related News