Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2020-26890
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Matrix Synapse before 1.20.0 erroneously permits non-standard NaN, Infinity, and -Infinity JSON values in fields of m.room.member events, allowing remote attackers to execute a denial of service attack against the federation and common Matrix clients. If such a malformed event is accepted into the room's state, the impact is long-lasting and is not fixed by an upgrade to a newer version, requiring the event to be manually redacted instead. Since events are replicated to servers of other room members, the impact is not constrained to the server of the event sender.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Matrix Synapse 注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Matrix Synapse是英国Matrix.org基金会的一款矩阵管理服务器的实现。 Matrix Synapse 1.20.0 之前版本存在安全漏洞,该漏洞允许在m.room.member事件的字段中使用非标准的NaN,Infinity和-Infinity JSON值,从而使远程攻击者可以对联合身份验证客户端和普通Matrix客户端执行拒绝服务攻击。 如果这种格式错误的事件被接受到房间的状态中,则影响将是持久的,并且无法通过升级到较新的版本来解决,因此需要手动编辑该事件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2020-26890
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2020-26890
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2020-26890

No comments yet


Leave a comment