
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-21392 affects Matrix Synapse, a Matrix reference homeserver written in Python. The vulnerability allows IP blacklist bypass via transitional IPv6 addresses on dual-stack networks. The issue was discovered in versions prior to 1.28.0 and was patched in version 1.28.0 (GitHub Advisory).
The vulnerability affects outbound requests to federation, identity servers, key validity calculations for third-party invite events, push notifications, and URL preview generation. On dual-stack networks, Synapse failed to properly restrict requests to external IP addresses when transitional IPv6 addresses were used, which could allow requests to internal infrastructure (GitHub Advisory).
This vulnerability could enable Synapse to make unauthorized requests to internal infrastructure on dual-stack networks, potentially exposing sensitive internal services or systems (GitHub Advisory).
As a temporary workaround, outbound requests to the following address ranges can be blocked by a firewall if unused for internal communication: ::ffff/80, ::0000/80, and 2002::/16. However, the recommended solution is to upgrade to Synapse version 1.28.0 or later which contains the fix (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."