CVE-2021-21392
Python vulnerability analysis and mitigation

Overview

CVE-2021-21392 affects Matrix Synapse, a Matrix reference homeserver written in Python. The vulnerability allows IP blacklist bypass via transitional IPv6 addresses on dual-stack networks. The issue was discovered in versions prior to 1.28.0 and was patched in version 1.28.0 (GitHub Advisory).

Technical details

The vulnerability affects outbound requests to federation, identity servers, key validity calculations for third-party invite events, push notifications, and URL preview generation. On dual-stack networks, Synapse failed to properly restrict requests to external IP addresses when transitional IPv6 addresses were used, which could allow requests to internal infrastructure (GitHub Advisory).

Impact

This vulnerability could enable Synapse to make unauthorized requests to internal infrastructure on dual-stack networks, potentially exposing sensitive internal services or systems (GitHub Advisory).

Mitigation and workarounds

As a temporary workaround, outbound requests to the following address ranges can be blocked by a firewall if unused for internal communication: ::ffff/80, ::0000/80, and 2002::/16. However, the recommended solution is to upgrade to Synapse version 1.28.0 or later which contains the fix (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management