CVE-2022-24751
Summary
| CVE | CVE-2022-24751 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-03-16 14:15:00 UTC |
| Updated | 2022-03-22 15:25:00 UTC |
| Description | Zulip is an open source group chat application. Starting with version 4.0 and prior to version 4.11, Zulip is vulnerable to a race condition during account deactivation, where a simultaneous access by the user being deactivated may, in rare cases, allow continued access by the deactivated user. A patch is available in version 4.11 on the 4.x branch and version 5.0-rc1 on the 5.x branch. Upgrading to a fixed version will, as a side effect, deactivate any cached sessions that may have been leaked through this bug. There are currently no known workarounds. |
Risk And Classification
Problem Types: CWE-362
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| CVE-2022-24751: Clear sessions outside of the transaction. · zulip/zulip@62ba8e4 · GitHub | MISC | github.com | |
| CVE-2022-24751: Clear sessions outside of the transaction. · zulip/zulip@e6eace3 · GitHub | MISC | github.com | |
| Race condition in user deactivation allows continued API access · Advisory · zulip/zulip · GitHub | CONFIRM | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.