matrix-js-sdk before 34.11.0 is vulnerable to client-side path traversal via crafted MXC URIs. A malicious room member can trigger clients based on the matrix-js-sdk to issue arbitrary authenticated GET requests to the client's homeserver.
The Matrix specification demands homeservers to perform validation of the server-name and media-id components of MXC URIs with the intent to prevent path traversal. However, it is not mentioned that a similar check must also be performed on the client to prevent client-side path traversal. matrix-js-sdk fails to perform this validation.
Fixed in matrix-js-sdk 34.11.1.
None.
{
"github_reviewed_at": "2024-11-12T19:54:38Z",
"github_reviewed": true,
"severity": "MODERATE",
"nvd_published_at": "2024-11-12T17:15:09Z",
"cwe_ids": [
"CWE-22"
]
}