Description
Sydent is a reference Matrix identity server. In Sydent versions 2.2.0 and prior, sissing input validation of some parameters on the endpoints used to confirm third-party identifiers could cause excessive use of disk space and memory leading to resource exhaustion. A patch for the vulnerability is in version 2.3.0. No workarounds are known to exist.
Published: 2021-04-15
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-0122 ### Impact Missing input validation of some parameters on the endpoints used to confirm third-party identifiers could cause excessive use of disk space and memory leading to resource exhaustion. ### Patches Fixed by 3175fd3. ### Workarounds There are no known workarounds. ### References n/a ### For more information If you have any questions or comments about this advisory, email us at security@matrix.org.
Github GHSA Github GHSA GHSA-pw4v-gr34-2553 Sydent DoS (via resource exhaustion) due to improper input validation
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-03T22:02:51.915Z

Reserved: 2021-03-30T00:00:00.000Z

Link: CVE-2021-29433

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-04-15T18:15:12.497

Modified: 2024-11-21T06:01:05.267

Link: CVE-2021-29433

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses