Miggo Logo

CVE-2024-36402: matrix-media-repo (MMR) allows unauthenticated writes to the media repository, which may allow planting of problematic content

5.3

CVSS Score
3.1

Basic Information

EPSS Score
0.33258%
Published
1/16/2025
Updated
1/17/2025
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/t2bot/matrix-media-repogo< 1.3.51.3.5

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from two key aspects: 1) Unauthenticated client-facing media endpoints that allowed triggering remote media caching, and 2) Federation handlers that accepted media without proper authentication. The first function represents the client-facing API endpoints (/_matrix/media/*) that lacked authentication checks before 1.3.5. The second function relates to federation pathways that may have allowed unauthorized media storage. Confidence is high for the client endpoints based on explicit patch notes about adding authenticated alternatives, and medium for federation handling based on the vulnerability's remote attack vector description.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t MMR ***or* v*rsion *.*.* *llows, *y **si*n, un*ut**nti**t** r*mot* p*rti*ip*nts to tri***r * *ownlo** *n* ****in* o* r*mot* m**i* *rom * r*mot* *om*s*rv*r to t** lo**l m**i* r*pository. Su** *ont*nt t**n *lso ***om*s *v*il**l* *or *ownlo*

Reasoning

T** vuln*r**ility st*ms *rom two k*y *sp**ts: *) Un*ut**nti**t** *li*nt-***in* m**i* *n*points t**t *llow** tri***rin* r*mot* m**i* ****in*, *n* *) ****r*tion **n*l*rs t**t ****pt** m**i* wit*out prop*r *ut**nti**tion. T** *irst `*un*tion` r*pr*s*nts