CVE-2022-41914

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-41914
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-41914.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-41914
Aliases
  • GHSA-q5gx-377v-w76f
Published
2022-11-16T20:15:10Z
Modified
2024-05-30T03:52:07.669948Z
Severity
  • 3.7 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

Zulip is an open-source team collaboration tool. For organizations with System for Cross-domain Identity Management(SCIM) account management enabled, Zulip Server 5.0 through 5.6 checked the SCIM bearer token using a comparator that did not run in constant time. Therefore, it might theoretically be possible for an attacker to infer the value of the token by performing a sophisticated timing analysis on a large number of failing requests. If successful, this would allow the attacker to impersonate the SCIM client for its abilities to read and update user accounts in the Zulip organization. Organizations where SCIM account management has not been enabled are not affected.

References

Affected packages

Git / github.com/zulip/zulip

Affected ranges

Type
GIT
Repo
https://github.com/zulip/zulip
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.3.0
1.3.1
1.3.10
1.3.11
1.3.12
1.3.13
1.3.2
1.3.3
1.3.4
1.3.5
1.3.6
1.3.7
1.3.8
1.3.9
1.4.0
1.5.0
1.6.0
1.7.0
1.8.0
1.8.0-rc1
1.9.0
1.9.0-rc2
1.9.0-rc3

2.*

2.0.0
2.0.0-rc1
2.1-dev
2.1.0
2.1.0-rc1
2.2-dev

3.*

3.0
3.0-dev
3.0-rc1
3.0-rc2

4.*

4.0
4.0-dev

5.*

5.0
5.0-dev
5.1
5.2
5.3
5.4
5.5
5.6

enterprise-1.*

enterprise-1.1.5
enterprise-1.2.0

shared-0.*

shared-0.0.1
shared-0.0.2
shared-0.0.3
shared-0.0.4
shared-0.0.5
shared-0.0.6
shared-0.0.7
shared-0.0.8
shared-0.0.9