Safety vulnerability ID: 74424
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Affected versions of Synapse are vulnerable to allocation of resources without limits or throttling (CWE-770). An attacker can send crafted multipart/form-data requests that transiently increase memory consumption, leading to denial of service. The vulnerability is exploitable through multipart/form-data request processing configurations. Synapse version 1.120.1 mitigates the issue by denying unsupported multipart/form-data content types. To remediate, upgrade to 1.120.1 or limit request sizes and block multipart/form-data via a reverse proxy or by setting a low max_upload_size in Synapse.
Latest version: 1.121.1
Homeserver for the Matrix decentralised comms protocol
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application