CVE-2022-41914

Zulip is an open-source team collaboration tool. For organizations with System for Cross-domain Identity Management(SCIM) account management enabled, Zulip Server 5.0 through 5.6 checked the SCIM bearer token using a comparator that did not run in constant time. Therefore, it might theoretically be possible for an attacker to infer the value of the token by performing a sophisticated timing analysis on a large number of failing requests. If successful, this would allow the attacker to impersonate the SCIM client for its abilities to read and update user accounts in the Zulip organization. Organizations where SCIM account management has not been enabled are not affected.
Configurations

Configuration 1 (hide)

cpe:2.3:a:zulip:zulip_server:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:24

Type Values Removed Values Added
References () https://github.com/zulip/zulip/commit/59edbfa4113d140d3e20126bc65f4d67b2a8ffe5 - Patch, Third Party Advisory () https://github.com/zulip/zulip/commit/59edbfa4113d140d3e20126bc65f4d67b2a8ffe5 - Patch, Third Party Advisory
References () https://github.com/zulip/zulip/security/advisories/GHSA-q5gx-377v-w76f - Third Party Advisory () https://github.com/zulip/zulip/security/advisories/GHSA-q5gx-377v-w76f - Third Party Advisory

Information

Published : 2022-11-16 20:15

Updated : 2024-11-21 07:24


NVD link : CVE-2022-41914

Mitre link : CVE-2022-41914

CVE.ORG link : CVE-2022-41914


JSON object : View

Products Affected

zulip

  • zulip_server
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-203

Observable Discrepancy