Miggo Logo

CVE-2024-36403: matrix-media-repo (MMR) allows denial of service/high operating costs through unauthenticated downloads

5.3

CVSS Score
3.1

Basic Information

EPSS Score
0.48544%
Published
1/16/2025
Updated
1/17/2025
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/t2bot/matrix-media-repogo< 1.3.51.3.5

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from unauthenticated users being able to trigger unlimited media downloads. The core issue would exist in the download request handling logic (first function) that doesn't enforce rate limits, and the media caching implementation (second function) that stores these downloads without proper resource constraints. The patch introduced a leaky bucket rate limiter which would likely be applied to these components. While exact function names aren't specified in available documentation, these are typical patterns for media repository implementations.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t MMR ***or* v*rsion *.*.* is vuln*r**l* to un*oun*** *isk *onsumption, w**r* *n un*ut**nti**t** **v*rs*ry **n in*u** it to *ownlo** *n* ***** l*r** *mounts o* r*mot* m**i* *il*s. MMR's typi**l op*r*tin* *nvironm*nt us*s S*-lik* stor*** *s

Reasoning

T** vuln*r**ility st*ms *rom un*ut**nti**t** us*rs **in* **l* to tri***r unlimit** m**i* *ownlo**s. T** *or* issu* woul* *xist in t** *ownlo** r*qu*st **n*lin* lo*i* (*irst `*un*tion`) t**t *o*sn't *n*or** r*t* limits, *n* t** m**i* ****in* impl*m*nt