Vulnerability Description
Sydent is a reference Matrix identity server. In Sydent versions 2.2.0 and prior, sissing input validation of some parameters on the endpoints used to confirm third-party identifiers could cause excessive use of disk space and memory leading to resource exhaustion. A patch for the vulnerability is in version 2.3.0. No workarounds are known to exist.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Matrix | Sydent | < 2.3.0 |
Related Weaknesses (CWE)
References
- https://github.com/matrix-org/sydent/commit/3175fd358ebc2c310eab7a3dbf296ce2bd54PatchThird Party Advisory
- https://github.com/matrix-org/sydent/security/advisories/GHSA-pw4v-gr34-2553PatchThird Party Advisory
- https://github.com/matrix-org/sydent/commit/3175fd358ebc2c310eab7a3dbf296ce2bd54PatchThird Party Advisory
- https://github.com/matrix-org/sydent/security/advisories/GHSA-pw4v-gr34-2553PatchThird Party Advisory
FAQ
What is CVE-2021-29433?
CVE-2021-29433 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Sydent is a reference Matrix identity server. In Sydent versions 2.2.0 and prior, sissing input validation of some parameters on the endpoints used to confirm third-party identifiers could cause exces...
How severe is CVE-2021-29433?
CVE-2021-29433 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-29433?
Check the references section above for vendor advisories and patch information. Affected products include: Matrix Sydent.