Description
matrix-appservice-irc is an open source Node.js IRC bridge for Matrix. Attackers can specify a specific string of characters, which would confuse the bridge into combining an attacker-owned channel and an existing channel, allowing them to grant themselves permissions in the channel. The vulnerability has been patched in matrix-appservice-irc 0.35.0. As a workaround operators may disable dynamic channel joining via `dynamicChannels.enabled` to prevent users from joining new channels, which prevents any new channels being bridged outside of what is already bridged, and what is specified in the config.
Remediation
References
https://github.com/matrix-org/matrix-appservice-irc/security/advisories/GHSA-xvqg-mv25-rwvw
https://matrix.org/blog/2022/09/13/security-release-of-matrix-appservice-irc-0-35-0-high-severity/
Related Vulnerabilities
CVE-2017-2613 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2018-5158 Vulnerability in maven package org.webjars.npm:pdfjs-dist
CVE-2021-41182 Vulnerability in maven package org.webjars.bowergithub.jquery:jquery-ui
CVE-2023-40816 Vulnerability in maven package org.opencrx:opencrx-core-models
CVE-2018-1000129 Vulnerability in maven package org.jolokia:jolokia-core