matrix-media-repo (MMR) allows unauthenticated writes to the media repository, which may allow planting of problematic content
Moderate severity
GitHub Reviewed
Published
Jan 16, 2025
in
t2bot/matrix-media-repo
•
Updated Jan 17, 2025
Description
Published to the GitHub Advisory Database
Jan 16, 2025
Reviewed
Jan 16, 2025
Published by the National Vulnerability Database
Jan 16, 2025
Last updated
Jan 17, 2025
Impact
MMR before version 1.3.5 allows, by design, unauthenticated remote participants to trigger a download and caching of remote media from a remote homeserver to the local media repository. Such content then also becomes available for download from the local homeserver in an unauthenticated way. The implication is that unauthenticated remote adversaries can use this functionality to plant problematic content into the media repository.
Patches
MMR 1.3.5 introduces a partial mitigation in the form of new endpoints which require authentication for media downloads. The unauthenticated endpoints will be frozen in a future release, closing the attack vector.
Workarounds
Though extremely limited, server operators can use more strict rate limits based on IP address.
References
matrix-org/matrix-spec-proposals#3916
References