Description
matrix-appservice-irc is an open source Node.js IRC bridge for Matrix. Attackers can specify a specific string of characters, which would confuse the bridge into combining an attacker-owned channel and an existing channel, allowing them to grant themselves permissions in the channel. The vulnerability has been patched in matrix-appservice-irc 0.35.0. As a workaround operators may disable dynamic channel joining via `dynamicChannels.enabled` to prevent users from joining new channels, which prevents any new channels being bridged outside of what is already bridged, and what is specified in the config.
Remediation
References
https://matrix.org/blog/2022/09/13/security-release-of-matrix-appservice-irc-0-35-0-high-severity/
https://github.com/matrix-org/matrix-appservice-irc/security/advisories/GHSA-xvqg-mv25-rwvw
Related Vulnerabilities
CVE-2021-34082 Vulnerability in npm package proctree
CVE-2023-46122 Vulnerability in maven package org.scala-sbt:sbt
CVE-2022-1438 Vulnerability in maven package org.keycloak:keycloak-services
CVE-2017-7545 Vulnerability in maven package org.jbpm:jbpm-designer-backend
CVE-2022-29253 Vulnerability in maven package org.xwiki.platform:xwiki-platform-oldcore