Published on: Not Yet Published
Last Modified on: 11/21/2022 08:22:00 PM UTC
CVE-2022-41914 - advisory for GHSA-q5gx-377v-w76fSource: Mitre Source: NIST CVE.ORG Print: PDF
Certain versions of Zulip Server from Zulip contain the following vulnerability:
Zulip is an open-source team collaboration tool. For organizations with System for Cross-domain Identity Management(SCIM) account management enabled, Zulip Server 5.0 through 5.6 checked the SCIM bearer token using a comparator that did not run in constant time. Therefore, it might theoretically be possible for an attacker to infer the value of the token by performing a sophisticated timing analysis on a large number of failing requests. If successful, this would allow the attacker to impersonate the SCIM client for its abilities to read and update user accounts in the Zulip organization. Organizations where SCIM account management has not been enabled are not affected.
- CVE-2022-41914 has been assigned by [email protected] to track the vulnerability - currently rated as LOW severity.
- Affected Vendor/Software: zulip - zulip version >= 5.0, < 5.7
CVSS3 Score: 3.7 - LOW
|Non-constant-time SCIM token comparison in Zulip Server · Advisory · zulip/zulip · GitHub|| github.com |
|scim: Check SCIM tokens using constant-time comparison. · zulip/[email protected] · GitHub|| github.com |
Exploit/POC from Github
Zulip is an open-source team collaboration tool. For organizations with System for Cross-domain Identity Management(S…
Known Affected Configurations (CPE V2.3)
|@CVEreport||CVE-2022-41914 : Zulip is an open-source team collaboration tool. For organizations with System for Cross-domain Id… twitter.com/i/web/status/1…||2022-11-16 19:41:49|