Privilege Escalation Vulnerability in Conduit Client-Server API

CVE-2024-6303
8.8HIGH

Key Information

Vendor
The Conduit Contributors
Status
Conduit
Vendor
CVE Published:
25 June 2024

Summary

Missing authorization in Client-Server API in Conduit <=0.7.0, allowing for any alias to be removed and added to another room, which can be used for privilege escalation by moving the #admins alias to a room which they control, allowing them to run commands resetting passwords, siging json with the server's key, deactivating users, and more

Affected Version(s)

Conduit < 0.8.0

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability Reserved.

  • Vulnerability published.

Collectors

NVD DatabaseMitre Database

Credit

Matthias Ahouansou for finding and patching the vulnerability
.