
Cloud Vulnerability DB
A community-led vulnerabilities database
A moderate severity vulnerability (GHSA-7h5v-85w9-pq6c) was identified in matrix-synapse versions prior to 1.33.0, affecting the third-party identifier endpoint. The vulnerability was discovered and disclosed on May 11, 2021, impacting the Matrix.org Synapse software. The issue stems from missing input validation of parameters used for confirming third-party identifiers (GitHub Advisory).
The vulnerability is classified with CWE-400 (Uncontrolled Resource Consumption) and CWE-20 (Improper Input Validation). The technical issue specifically relates to the lack of proper validation for parameters on endpoints used to confirm third-party identifiers, which could lead to resource exhaustion. The severity is rated as Moderate according to the GitHub Advisory Database (GitHub Advisory).
The vulnerability could result in denial of service through resource exhaustion, specifically causing excessive use of disk space and memory. This impact occurs due to the improper validation of input parameters in the third-party identifier confirmation process (GitHub Advisory).
The vulnerability was patched in matrix-synapse version 1.33.0. The fix was implemented through PR #9855, which added limits to the length of accepted email addresses. No alternative workarounds were available for users unable to upgrade (GitHub PR, GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."