Description
matrix-js-sdk is the Matrix Client-Server SDK for JavaScript and TypeScript. An attacker present in a room where an MSC3401 group call is taking place can eavesdrop on the video and audio of participants using matrix-js-sdk, without their knowledge. To affected matrix-js-sdk users, the attacker will not appear to be participating in the call. This attack is possible because matrix-js-sdk's group call implementation accepts incoming direct calls from other users, even if they have not yet declared intent to participate in the group call, as a means of resolving a race condition in call setup. Affected versions do not restrict access to the user's outbound media in this case. Legacy 1:1 calls are unaffected. This is fixed in matrix-js-sdk 24.1.0. As a workaround, users may hold group calls in private rooms where only the exact users who are expected to participate in the call are present.
Remediation
References
https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-6g67-q39g-r79q
https://github.com/matrix-org/matrix-spec-proposals/pull/3401
https://github.com/matrix-org/matrix-js-sdk/releases/tag/v24.1.0
Related Vulnerabilities
CVE-2016-2402 Vulnerability in maven package com.squareup.okhttp:okhttp
CVE-2014-3656 Vulnerability in maven package org.keycloak:keycloak-services
CVE-2015-5317 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2011-3375 Vulnerability in maven package org.apache.tomcat:tomcat-catalina
CVE-2023-33943 Vulnerability in maven package com.liferay:com.liferay.account.admin.web