Vulnerability Details : CVE-2022-31134
Zulip is an open-source team collaboration tool. Zulip Server versions 2.1.0 above have a user interface tool, accessible only to server owners and server administrators, which provides a way to download a "public data" export. While this export is only accessible to administrators, in many configurations server administrators are not expected to have access to private messages and private streams. However, the "public data" export which administrators could generate contained the attachment contents for all attachments, even those from private messages and streams. Zulip Server version 5.4 contains a patch for this issue.
Vulnerability category: Information leak
Products affected by CVE-2022-31134
- cpe:2.3:a:zulip:zulip_server:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-31134
0.23%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 46 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-31134
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:N/A:N |
8.0
|
2.9
|
NIST | |
4.9
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N |
1.2
|
3.6
|
NIST | |
4.9
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N |
1.2
|
3.6
|
GitHub, Inc. |
CWE ids for CVE-2022-31134
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: security-advisories@github.com (Secondary)
-
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-31134
-
https://blog.zulip.com/2022/07/12/zulip-server-5-4-security-release
Zulip Server 5.4 security releaseRelease Notes;Vendor Advisory
-
https://blog.zulip.com/2022/07/12/zulip-cloud-data-exports
Data exported by Zulip Cloud organization administrators contained private filesVendor Advisory
-
https://github.com/zulip/zulip/security/advisories/GHSA-58pm-88xp-7x9m
Public data export contains attachments that are non-public · Advisory · zulip/zulip · GitHubRelease Notes;Third Party Advisory
Jump to