Skip to content

Commit

Permalink
Merge pull request #2490 from matrix-org/dkasak/hof-tweaks
Browse files Browse the repository at this point in the history
Tidy up minor HoF inconsistencies
  • Loading branch information
dkasak authored Dec 5, 2024
2 parents 28f639e + 9a14d71 commit f5e5cf5
Showing 1 changed file with 19 additions and 19 deletions.
38 changes: 19 additions & 19 deletions content/security-hall-of-fame/findings.toml
Original file line number Diff line number Diff line change
Expand Up @@ -49,7 +49,7 @@ reporter.name = "Josh Qou"
reporter.link = "https://github.com/joshqou"
summary = """
Discovered that the download endpoint of the matrix-media-repo was serving unsafe media inline
([CVE-2023-41318](https://nvd.nist.gov/vuln/detail/CVE-2023-41318)/
([CVE-2023-41318](https://www.cve.org/CVERecord?id=CVE-2023-41318) /
[GHSA-5crw-6j7v-xc72](https://github.com/turt2live/matrix-media-repo/security/advisories/GHSA-5crw-6j7v-xc72)).
"""
project = "matrix-media-repo"
Expand All @@ -60,7 +60,7 @@ reporter.name = "Thimothé Maljean"
reporter.link = "https://www.linkedin.com/in/thimoth%C3%A9-maljean/"
summary = """
Discovered temporary storage of plaintext passwords during password changes
([CVE-2023-41335](https://nvd.nist.gov/vuln/detail/CVE-2023-41335)/
([CVE-2023-41335](https://www.cve.org/CVERecord?id=CVE-2023-41335) /
[GHSA-4f74-84v3-j9q5](https://github.com/matrix-org/synapse/security/advisories/GHSA-4f74-84v3-j9q5)).
"""
project = "Synapse"
Expand All @@ -71,7 +71,7 @@ reporter.name = "S1m"
reporter.link = "https://github.com/p1gp1g"
summary = """
Discovered an XSS vector for
[CVE-2023-30609](https://nvd.nist.gov/vuln/detail/CVE-2023-30609)/
[CVE-2023-30609](https://www.cve.org/CVERecord?id=CVE-2023-30609) /
[GHSA-xv83-x443-7rmw](https://github.com/matrix-org/matrix-react-sdk/security/advisories/GHSA-xv83-x443-7rmw).
"""
project = "Matrix React SDK"
Expand All @@ -82,7 +82,7 @@ reporter.name = "Cadence Ember"
reporter.link = "https://cadence.moe/"
summary = """
Found an HTML injection via highlighting of search results
([CVE-2023-30609](https://nvd.nist.gov/vuln/detail/CVE-2023-38690)/
([CVE-2023-30609](https://www.cve.org/CVERecord?id=CVE-2023-38690) /
[GHSA-xv83-x443-7rmw](https://github.com/matrix-org/matrix-react-sdk/security/advisories/GHSA-xv83-x443-7rmw)).
"""
project = "Matrix React SDK"
Expand All @@ -102,7 +102,7 @@ reporter.name = "Val Lorentz"
reporter.link = "https://valentin-lorentz.fr/"
summary = """
Discovered a IRC command injection via admin commands
([CVE-2023-38690](https://nvd.nist.gov/vuln/detail/CVE-2023-38690)/
([CVE-2023-38690](https://www.cve.org/CVERecord?id=CVE-2023-38690) /
[GHSA-3pmj-jqqp-2mj3](https://github.com/matrix-org/matrix-appservice-irc/security/advisories/GHSA-3pmj-jqqp-2mj3)).
"""
project = "matrix-appservice-irc"
Expand Down Expand Up @@ -247,7 +247,7 @@ summary = """
Remotely triggerable host program execution with user interaction, caused by an
outdated Electron dependency. Depending on the host environment, full RCE may be
possible. Fixed in Element Desktop 1.9.7 and tracked as [GHSA-mjrg-9f8r-h3m7](https://github.com/vector-im/element-desktop/security/advisories/GHSA-mjrg-9f8r-h3m7)
/ [CVE-2022-23597](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23597).
/ [CVE-2022-23597](https://www.cve.org/CVERecord?id=CVE-2022-23597).
"""
project = "Element Desktop"

Expand All @@ -258,7 +258,7 @@ reporter.link = "https://github.com/brevilo"
summary = """
Buffer overflow in olm_session_describe in libolm before version 3.2.8, remotely
triggerable from matrix-js-sdk before 15.2.1. Fixed in libolm 3.2.8 and
matrix-js-sdk 15.2.1. Assigned [CVE-2021-44538](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44538).
matrix-js-sdk 15.2.1. Assigned [CVE-2021-44538](https://www.cve.org/CVERecord?id=CVE-2021-44538).
"""
project = "libolm"

Expand Down Expand Up @@ -287,7 +287,7 @@ reporter.name = "Thomas Chauchefoin (SonarSource)"
reporter.link = "https://www.sonarsource.com/"
summary = """
Discovered status.matrix.org was running a version of Cachet vulnerable to an
[SQL injection](https://nvd.nist.gov/vuln/detail/CVE-2021-39165). Since this
[SQL injection](https://www.cve.org/CVERecord?id=CVE-2021-39165). Since this
host was used solely for running the status page, we fixed this by
decommissioning it and switching to Atlassian's Statuspage service.
"""
Expand All @@ -296,7 +296,7 @@ project = "status.matrix.org"
[[findings]]
date = "2021-07-03"
reporter.name = "Aaron Raimist"
reporter.link = "https://github.com/aaronraimist/"
reporter.link = "https://github.com/aaronraimist"
summary = """
Discovered that an explicit assignment of power level 0 was misinterpreted as
the default power level. Fixed in Synapse v1.40.0.
Expand All @@ -306,7 +306,7 @@ project = "Synapse"
[[findings]]
date = "2021-05-21"
reporter.name = "Aaron Raimist and an anonymous security researcher"
reporter.link = "https://github.com/aaronraimist/"
reporter.link = "https://github.com/aaronraimist"
summary = """
Discovered that Element Android was disclosing the filename of end-to-end
encrypted attachments to the homeserver. Fixed in Element Android 1.1.8.
Expand Down Expand Up @@ -336,7 +336,7 @@ project = "Matrix React SDK"
[[findings]]
date = "2021-01-18"
reporter.name = "Michaël Scherer"
reporter.link = "https://github.com/mscherer/"
reporter.link = "https://github.com/mscherer"
summary = """
IP blacklist bypass via transitional IPv6 addresses on dual-stack networks
([CVE-2021-21392](https://github.com/matrix-org/synapse/security/advisories/GHSA-5wrh-4jwv-5w78)).
Expand All @@ -356,20 +356,20 @@ project = "Element iOS"
[[findings]]
date = "2020-11-17"
reporter.name = "Michaël Scherer"
reporter.link = "https://github.com/mscherer/"
reporter.link = "https://github.com/mscherer"
summary = """
Denial of service attack via .well-known lookups ([CVE-2021-21274](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21274)).
Denial of service attack via .well-known lookups ([CVE-2021-21274](https://www.cve.org/CVERecord?id=CVE-2021-21274)).
Fixed in Synapse 1.25.0.
"""
project = "Synapse"

[[findings]]
date = "2020-11-17"
reporter.name = "Michaël Scherer"
reporter.link = "https://github.com/mscherer/"
reporter.link = "https://github.com/mscherer"
summary = """
IP blacklist bypass via redirects on some federation and push requests
([CVE-2021-21273](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21273)).
([CVE-2021-21273](https://www.cve.org/CVERecord?id=CVE-2021-21273)).
Fixed in Synapse 1.25.0.
"""
project = "Synapse"
Expand All @@ -380,7 +380,7 @@ reporter.name = "Denis Kasak"
reporter.link = "https://github.com/dkasak"
summary = """
HTML injection in login fallback endpoints could be used for a
Cross-site-scripting attack ([CVE-2020-26891](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26891)).
Cross-site-scripting attack ([CVE-2020-26891](https://www.cve.org/CVERecord?id=CVE-2020-26891)).
Fixed in Synapse 1.21.0.
"""
project = "Synapse"
Expand Down Expand Up @@ -410,7 +410,7 @@ project = "Element"
[[findings]]
date = "2020-07-29"
reporter.name = "0x1a8510f2"
reporter.link = "https://github.com/0x1a8510f2/"
reporter.link = "https://github.com/0x1a8510f2"
summary = """
An issue where Element Android was leaking PII. Fixed in [Element Android 1.0.5](https://github.com/vector-im/element-android/releases/tag/v1.0.5)
"""
Expand All @@ -432,7 +432,7 @@ reporter.name = "Denis Kasak"
reporter.link = "https://github.com/dkasak"
summary = """
Invalid JSON could become part of the room state, acting as a denial of service
vector ([CVE-2020-26890](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26890)).
vector ([CVE-2020-26890](https://www.cve.org/CVERecord?id=CVE-2020-26890)).
Fixed in Synapse 1.20.0. Disclosed 2020-11-23.
"""
project = "Synapse"
Expand Down Expand Up @@ -558,7 +558,7 @@ reporter.name = "fs0c131y"
reporter.link = "https://fs0c131y.com/"
summary = """
An email validation exploit in Sydent. For more details see [here](https://matrix.org/blog/2019/04/18/security-update-sydent-1-0-2/)
and [CVE-2019-11340](https://www.cvedetails.com/cve/CVE-2019-11340/).
and [CVE-2019-11340](https://www.cve.org/CVERecord?id=CVE-2019-11340).
"""
project = "Sydent"

Expand Down

0 comments on commit f5e5cf5

Please sign in to comment.