CVE-2023-38686

Sydent is an identity server for the Matrix communications protocol. Prior to version 2.5.6, if configured to send emails using TLS, Sydent does not verify SMTP servers' certificates. This makes Sydent's emails vulnerable to interception via a man-in-the-middle (MITM) attack. Attackers with privileged access to the network can intercept room invitations and address confirmation emails. This is patched in Sydent 2.5.6. When patching, make sure that Sydent trusts the certificate of the server it is connecting to. This should happen automatically when using properly issued certificates. Those who use self-signed certificates should make sure to copy their Certification Authority certificate, or their self signed certificate if using only one, to the trust store of your operating system. As a workaround, one can ensure Sydent's emails fail to send by setting the configured SMTP server to a loopback or non-routable address under one's control which does not have a listening SMTP server.
Configurations

Configuration 1 (hide)

cpe:2.3:a:matrix:sydent:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:14

Type Values Removed Values Added
Summary
  • (es) Sydent es un servidor de identidad para el protocolo de comunicaciones Matrix. Antes de la versión 2.5.6, si se configuraba para enviar correos electrónicos utilizando TLS, Sydent no verificaba los certificados de los servidores SMTP. Esto hace que los correos electrónicos de Sydent sean vulnerables a la interceptación a través de un ataque man-in-the-middle (MITM). Los atacantes con acceso privilegiado a la red pueden interceptar invitaciones a salas y correos electrónicos de confirmación de direcciones. Esto se ha parcheado en Sydent 2.5.6. Al aplicar el parche, asegúrese de que Sydent confía en el certificado del servidor al que se conecta. Esto debería ocurrir automáticamente si se utilizan certificados emitidos correctamente. Aquellos que utilicen certificados autofirmados deben asegurarse de copiar su certificado de Autoridad de Certificación, o su certificado autofirmado si sólo utilizan uno, al almacén de confianza de su sistema operativo. Como solución alternativa, puede asegurarse de que los correos electrónicos de Sydent no se envíen configurando el servidor SMTP a una dirección de bucle de retorno o no enrutable bajo su control que no tenga un servidor SMTP a la escucha.
CVSS v2 : unknown
v3 : 5.3
v2 : unknown
v3 : 9.3
References () https://docs.python.org/3/library/ssl.html?highlight=ssl#security-considerations - Technical Description () https://docs.python.org/3/library/ssl.html?highlight=ssl#security-considerations - Technical Description
References () https://github.com/matrix-org/sydent/commit/1cd748307c6b168b66154e6c4db715d4b9551261 - Patch () https://github.com/matrix-org/sydent/commit/1cd748307c6b168b66154e6c4db715d4b9551261 - Patch
References () https://github.com/matrix-org/sydent/pull/574 - Issue Tracking, Patch () https://github.com/matrix-org/sydent/pull/574 - Issue Tracking, Patch
References () https://github.com/matrix-org/sydent/releases/tag/v2.5.6 - Release Notes () https://github.com/matrix-org/sydent/releases/tag/v2.5.6 - Release Notes
References () https://github.com/matrix-org/sydent/security/advisories/GHSA-p6hw-wm59-3g5g - Vendor Advisory () https://github.com/matrix-org/sydent/security/advisories/GHSA-p6hw-wm59-3g5g - Vendor Advisory
References () https://github.com/python/cpython/issues/91826 - Issue Tracking () https://github.com/python/cpython/issues/91826 - Issue Tracking
References () https://peps.python.org/pep-0476/ - Third Party Advisory () https://peps.python.org/pep-0476/ - Third Party Advisory

Information

Published : 2023-08-04 16:15

Updated : 2024-11-21 08:14


NVD link : CVE-2023-38686

Mitre link : CVE-2023-38686

CVE.ORG link : CVE-2023-38686


JSON object : View

Products Affected

matrix

  • sydent
CWE
CWE-295

Improper Certificate Validation