Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-41914


Zulip is an open-source team collaboration tool. For organizations with System for Cross-domain Identity Management(SCIM) account management enabled, Zulip Server 5.0 through 5.6 checked the SCIM bearer token using a comparator that did not run in constant time. Therefore, it might theoretically be possible for an attacker to infer the value of the token by performing a sophisticated timing analysis on a large number of failing requests. If successful, this would allow the attacker to impersonate the SCIM client for its abilities to read and update user accounts in the Zulip organization. Organizations where SCIM account management has not been enabled are not affected.


Published

2022-11-16T20:15:10.580

Last Modified

2024-11-21T07:24:03.447

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 3.7 (LOW)

Weaknesses
  • Type: Secondary
    CWE-200
  • Type: Primary
    CWE-203

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application zulip zulip_server < 5.7 Yes

References