Zulip is an open source group chat application. Starting with version 4.0 and prior to version 4.11, Zulip is vulnerable to a race condition during account deactivation, where a simultaneous access by the user being deactivated may, in rare cases, allow continued access by the deactivated user. A patch is available in version 4.11 on the 4.x branch and version 5.0-rc1 on the 5.x branch. Upgrading to a fixed version will, as a side effect, deactivate any cached sessions that may have been leaked through this bug. There are currently no known workarounds.
References
Link | Resource |
---|---|
https://github.com/zulip/zulip/commit/62ba8e455d8f460001d9fb486a6dabfd1ed67717 | Patch Third Party Advisory |
https://github.com/zulip/zulip/commit/e6eace307ef435eec3395c99247155efed9219e4 | Patch Third Party Advisory |
https://github.com/zulip/zulip/security/advisories/GHSA-6v98-m5x5-phqj | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2022-03-16 14:15
Updated : 2024-02-28 19:09
NVD link : CVE-2022-24751
Mitre link : CVE-2022-24751
CVE.ORG link : CVE-2022-24751
JSON object : View
Products Affected
zulip
- zulip
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')