Description
Sydent is a reference Matrix identity server. Sydent can be induced to send HTTP GET requests to internal systems, due to lack of parameter validation or IP address blacklisting. It is not possible to exfiltrate data or control request headers, but it might be possible to use the attack to perform an internal port enumeration. This issue has been addressed in in 9e57334, 8936925, 3d531ed, 0f00412. A potential workaround would be to use a firewall to ensure that Sydent cannot reach internal HTTP resources.
References (7)
Core 7
Core References
Product, Third Party Advisory x_refsource_misc
https://pypi.org/project/matrix-sydent/
Release Notes, Third Party Advisory x_refsource_misc
https://github.com/matrix-org/sydent/releases/tag/v2.3.0
Patch, Third Party Advisory x_refsource_confirm
https://github.com/matrix-org/sydent/security/advisories/GHSA-9jhm-8m8c-c3f4
Patch, Third Party Advisory x_refsource_misc
https://github.com/matrix-org/sydent/commit/9e573348d81df8191bbe8c266c01999c9d57cd5f
Patch, Third Party Advisory x_refsource_misc
https://github.com/matrix-org/sydent/commit/8936925f561b0c352c2fa922d5097d7245aad00a
Patch, Third Party Advisory x_refsource_misc
https://github.com/matrix-org/sydent/commit/3d531ed50d2fd41ac387f36d44d3fb2c62dd22d3
Patch, Third Party Advisory x_refsource_misc
https://github.com/matrix-org/sydent/commit/0f00412017f25619bc36c264b29ea96808bf310a
Scores
CVSS v3
7.7
EPSS
0.0030
EPSS Percentile
53.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Details
CWE
CWE-918
CWE-20
Status
published
Products (2)
matrix/sydent
< 2.3.0
pypi/matrix-sydent
0 - 2.3.0PyPI
Published
Apr 15, 2021
Tracked Since
Feb 18, 2026