CVE-2024-47779

Element is a Matrix web client built using the Matrix React SDK. Element Web versions 1.11.70 through 1.11.80 contain a vulnerability which can, under specially crafted conditions, lead to the access token becoming exposed to third parties. At least one vector has been identified internally, involving malicious widgets, but other vectors may exist. Note that despite superficial similarity to CVE-2024-47771, this is an entirely separate vulnerability, caused by a separate piece of code included only in Element Web. Element Web and Element Desktop share most but not all, of their code and this vulnerability exists in the part of the code base which is not shared between the projects. Users are strongly advised to upgrade to version 1.11.81 to remediate the issue. As a workaround, avoid granting permissions to untrusted widgets.
CVSS

No CVSS.

Configurations

No configuration.

History

12 Nov 2024, 17:15

Type Values Removed Values Added
Summary (en) Element is a Matrix web client built using the Matrix React SDK .Element Web versions 1.11.70 through 1.11.80 contain a vulnerability which can, under specially crafted conditions, lead to the access token becoming exposed to third parties. At least one vector has been identified internally, involving malicious widgets, but other vectors may exist. Note that despite superficial similarity to CVE-2024-47771, this is an entirely separate vulnerability, caused by a separate piece of code included only in Element Web. Element Web and Element Desktop share most but not all, of their code and this vulnerability exists in the part of the code base which is not shared between the projects. Users are strongly advised to upgrade to version 1.11.81 to remediate the issue. As a workaround, avoid granting permissions to untrusted widgets. (en) Element is a Matrix web client built using the Matrix React SDK. Element Web versions 1.11.70 through 1.11.80 contain a vulnerability which can, under specially crafted conditions, lead to the access token becoming exposed to third parties. At least one vector has been identified internally, involving malicious widgets, but other vectors may exist. Note that despite superficial similarity to CVE-2024-47771, this is an entirely separate vulnerability, caused by a separate piece of code included only in Element Web. Element Web and Element Desktop share most but not all, of their code and this vulnerability exists in the part of the code base which is not shared between the projects. Users are strongly advised to upgrade to version 1.11.81 to remediate the issue. As a workaround, avoid granting permissions to untrusted widgets.

16 Oct 2024, 16:38

Type Values Removed Values Added
Summary
  • (es) Element es un cliente web de Matrix creado con el SDK de Matrix React. Las versiones 1.11.70 a 1.11.80 de Element Web contienen una vulnerabilidad que, en condiciones especialmente manipuladas, puede provocar que el token de acceso quede expuesto a terceros. Se ha identificado al menos un vector internamente, que involucra widgets maliciosos, pero pueden existir otros vectores. Tenga en cuenta que, a pesar de la similitud superficial con CVE-2024-47771, se trata de una vulnerabilidad completamente independiente, causada por un fragmento de código independiente incluido solo en Element Web. Element Web y Element Desktop comparten la mayor parte, pero no todo, de su código y esta vulnerabilidad existe en la parte de la base de código que no se comparte entre los proyectos. Se recomienda encarecidamente a los usuarios que actualicen a la versión 1.11.81 para solucionar el problema. Como workaround, evite otorgar permisos a widgets que no sean de confianza.

15 Oct 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-15 16:15

Updated : 2024-11-12 17:15


NVD link : CVE-2024-47779

Mitre link : CVE-2024-47779

CVE.ORG link : CVE-2024-47779


JSON object : View

Products Affected

No product.

CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor