Loading HuntDB...

GHSA-5wrh-4jwv-5w78

GitHub Security Advisory

Open redirect via transitional IPv6 addresses on dual-stack networks

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

### Impact
Requests to user provided domains were not restricted to external IP addresses when transitional IPv6 addresses were used. Outbound requests to federation, identity servers, when calculating the key validity for third-party invite events, sending push notifications, and generating URL previews are affected. This could cause Synapse to make requests to internal infrastructure on dual-stack networks.

### Patches
This issue is fixed by #9240.

### Workarounds
Outbound requests to the following address ranges can be blocked by a firewall, if unused for internal communication between systems:

* `::ffff/80`
* `::0000/80` (note that this IP range is considered deprecated by the IETF)
* `2002::/16` (note that this IP range is considered deprecated by the IETF)

### References
* [RFC3056](https://tools.ietf.org/html/rfc3056)
* [RFC4291](https://tools.ietf.org/html/rfc4291)

Affected Packages

PyPI matrix-synapse
Affected versions: 0 (fixed in 1.28.0rc1)

Related CVEs

Key Information

GHSA ID
GHSA-5wrh-4jwv-5w78
Published
April 13, 2021 3:13 PM
Last Modified
September 30, 2024 8:28 PM
CVSS Score
7.5 /10
Primary Ecosystem
PyPI
Primary Package
matrix-synapse
GitHub Reviewed
✓ Yes

Dataset

Last updated: September 16, 2025 6:29 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.