| |
Vulnerability CVE-2022-24751
Published: 2022-03-16
Description: |
Zulip is an open source group chat application. Starting with version 4.0 and prior to version 4.11, Zulip is vulnerable to a race condition during account deactivation, where a simultaneous access by the user being deactivated may, in rare cases, allow continued access by the deactivated user. A patch is available in version 4.11 on the 4.x branch and version 5.0-rc1 on the 5.x branch. Upgrading to a fixed version will, as a side effect, deactivate any cached sessions that may have been leaked through this bug. There are currently no known workarounds. |
Type:
CWE-362
CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
5.8/10 |
4.9/10 |
8.6/10 |
Exploit range |
Attack complexity |
Authentication |
Remote |
Medium |
No required |
Confidentiality impact |
Integrity impact |
Availability impact |
Partial |
Partial |
None |
References: |
https://github.com/zulip/zulip/commit/62ba8e455d8f460001d9fb486a6dabfd1ed67717
https://github.com/zulip/zulip/commit/e6eace307ef435eec3395c99247155efed9219e4
https://github.com/zulip/zulip/security/advisories/GHSA-6v98-m5x5-phqj
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|