CVE-2023-45129: matrix-synapse vulnerable to denial of service due to malicious server ACL events
4.9
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.48488%
CWE
Published
10/10/2023
Updated
9/24/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| matrix-synapse | pip | < 1.94.0 | 1.94.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the original server ACL checking implementation in server_matches_acl_event, which processed allow/deny lists by converting glob patterns to regexes on every check. The commit f84da3c introduced caching and Rust-based pre-compilation, indicating the previous implementation lacked throttling/caching. The function was removed in the patch and replaced with a cached evaluator, confirming it was the source of the resource allocation vulnerability.