Miggo Logo

CVE-2023-29529: matrix-js-sdk vulnerable to invisible eavesdropping in group calls

5

CVSS Score
3.1

Basic Information

EPSS Score
0.40329%
Published
4/14/2023
Updated
4/25/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
matrix-js-sdknpm< 24.1.024.1.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from missing authorization checks during group call setup. The SDK accepted incoming direct calls even when the caller hadn't declared participation via m.call.member events. Functions responsible for handling incoming call invites (e.g., handleIncomingCall, onCallInvite) would be the logical points where this check was omitted. The CWE-862 (Missing Authorization) aligns with this scenario, and the patched version (24.1.0) likely added participant validation in these functions.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t *n *tt**k*r pr*s*nt in * room w**r* *n [MS*****](*ttps://*it*u*.*om/m*trix-or*/m*trix-sp**-propos*ls/pull/****) *roup **ll is t*kin* pl*** **n **v*s*rop on t** vi**o *n* *u*io o* p*rti*ip*nts usin* m*trix-js-s*k, wit*out t**ir knowl****.

Reasoning

T** vuln*r**ility st*ms *rom missin* *ut*oriz*tion ****ks *urin* *roup **ll s*tup. T** S*K ****pt** in*omin* *ir**t **lls *v*n w**n t** **ll*r ***n't ***l*r** p*rti*ip*tion vi* `m.**ll.m*m**r` *v*nts. *un*tions r*sponsi*l* *or **n*lin* in*omin* **ll