{"id":"UBUNTU-CVE-2023-32683","details":"Synapse is a Matrix protocol homeserver written in Python with the Twisted framework. A discovered oEmbed or image URL can bypass the `url_preview_url_blacklist` setting potentially allowing server side request forgery or bypassing network policies. Impact is limited to IP addresses allowed by the `url_preview_ip_range_blacklist` setting (by default this only allows public IPs) and by the limited information returned to the client: 1. For discovered oEmbed URLs, any non-JSON response or a JSON response which includes non-oEmbed information is discarded. 2. For discovered image URLs, any non-image response is discarded. Systems which have URL preview disabled (via the `url_preview_enabled` setting) or have not configured a `url_preview_url_blacklist` are not affected. This issue has been addressed in version 1.85.0. Users are advised to upgrade. User unable to upgrade may also disable URL previews.","modified":"2026-02-04T03:29:32.306928Z","published":"2023-06-06T19:15:00Z","related":["USN-7444-1"],"upstream":["CVE-2023-32683"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-32683"},{"type":"REPORT","url":"https://github.com/matrix-org/synapse/security/advisories/GHSA-98px-6486-j7qc"},{"type":"REPORT","url":"https://github.com/matrix-org/synapse/pull/15601"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2023-32683"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7444-1"}],"affected":[{"package":{"name":"matrix-synapse","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/matrix-synapse@0.24.0+dfsg-1ubuntu0.1~esm4?arch=source&distro=esm-apps/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.24.0+dfsg-1ubuntu0.1~esm4"}]}],"versions":["0.19.2+dfsg-6","0.24.0+dfsg-1","0.24.0+dfsg-1ubuntu0.1~esm1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_version":"0.24.0+dfsg-1ubuntu0.1~esm4","binary_name":"matrix-synapse"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-32683.json"}},{"package":{"name":"matrix-synapse","ecosystem":"Ubuntu:Pro:20.04:LTS","purl":"pkg:deb/ubuntu/matrix-synapse@1.11.0-1ubuntu0.1~esm2?arch=source&distro=esm-apps/focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.11.0-1ubuntu0.1~esm2"}]}],"versions":["1.3.0-1","1.4.0-1","1.5.0-1","1.5.1-1","1.6.0-1","1.6.1-1","1.7.0-2","1.7.1-1","1.7.2-1","1.7.3-1","1.8.0-1","1.9.0-1","1.9.1-1","1.10.0-1","1.10.0-2","1.11.0-1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_version":"1.11.0-1ubuntu0.1~esm2","binary_name":"matrix-synapse"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-32683.json"}},{"package":{"name":"matrix-synapse","ecosystem":"Ubuntu:Pro:22.04:LTS","purl":"pkg:deb/ubuntu/matrix-synapse@1.53.0-1ubuntu0.1~esm2?arch=source&distro=esm-apps/jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.53.0-1ubuntu0.1~esm2"}]}],"versions":["1.39.0-1","1.47.0-2","1.47.1-1","1.48.0-1","1.49.0-1","1.49.2-1","1.50.1-1","1.50.2-1","1.51.0-1","1.52.0-1","1.53.0-1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_version":"1.53.0-1ubuntu0.1~esm2","binary_name":"matrix-synapse"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-32683.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]}