Impact
A logic flaw in matrix-authentication-service 0.20.0 through 1.4.0 allows an attacker with access to an authenticated MAS session to perform sensitive operations without entering the current password. These include changing the current password, adding or removing an e-mail address and deactivating the account.
The vulnerability only affects instances which have the local password database feature enabled (passwords section in the config).
Note that merely having access to an authenticated Matrix client is not enough to exploit the vulnerability; the prerequisite is access to an authenticated MAS session.
Patches
Patched in matrix-authentication-service 1.4.1.
Impact
A logic flaw in matrix-authentication-service 0.20.0 through 1.4.0 allows an attacker with access to an authenticated MAS session to perform sensitive operations without entering the current password. These include changing the current password, adding or removing an e-mail address and deactivating the account.
The vulnerability only affects instances which have the local password database feature enabled (
passwordssection in the config).Note that merely having access to an authenticated Matrix client is not enough to exploit the vulnerability; the prerequisite is access to an authenticated MAS session.
Patches
Patched in matrix-authentication-service 1.4.1.