Safety vulnerability ID: 42303
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Synapse 1.28.0 includes a fix for CVE-2021-21392: In Synapse before version 1.28.0 requests to user provided domains were not restricted to external IP addresses when using transitional IPv6 addresses. Outbound requests to federation, identity servers, when calculating the key validity for third-party invite events, sending push notifications, and generating URL previews are affected. This could cause Synapse to make requests to internal infrastructure on dual-stack networks.
https://github.com/matrix-org/synapse/security/advisories/GHSA-5wrh-4jwv-5w78
Latest version: 1.121.1
Homeserver for the Matrix decentralised comms protocol
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application