CVE-2022-31134

Zulip is an open-source team collaboration tool. Zulip Server versions 2.1.0 above have a user interface tool, accessible only to server owners and server administrators, which provides a way to download a "public data" export. While this export is only accessible to administrators, in many configurations server administrators are not expected to have access to private messages and private streams. However, the "public data" export which administrators could generate contained the attachment contents for all attachments, even those from private messages and streams. Zulip Server version 5.4 contains a patch for this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:zulip:zulip_server:*:*:*:*:*:*:*:*

History

22 Jul 2022, 16:34

Type Values Removed Values Added
CPE cpe:2.3:a:zulip:zulip_server:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 4.0
v3 : 4.9
CWE CWE-200 CWE-434
References (MISC) https://blog.zulip.com/2022/07/12/zulip-cloud-data-exports - (MISC) https://blog.zulip.com/2022/07/12/zulip-cloud-data-exports - Vendor Advisory
References (MISC) https://blog.zulip.com/2022/07/12/zulip-server-5-4-security-release - (MISC) https://blog.zulip.com/2022/07/12/zulip-server-5-4-security-release - Release Notes, Vendor Advisory
References (CONFIRM) https://github.com/zulip/zulip/security/advisories/GHSA-58pm-88xp-7x9m - (CONFIRM) https://github.com/zulip/zulip/security/advisories/GHSA-58pm-88xp-7x9m - Release Notes, Third Party Advisory

12 Jul 2022, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-07-12 21:15

Updated : 2024-02-04 22:51


NVD link : CVE-2022-31134

Mitre link : CVE-2022-31134

CVE.ORG link : CVE-2022-31134


JSON object : View

Products Affected

zulip

  • zulip_server
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type

CWE-200

Exposure of Sensitive Information to an Unauthorized Actor