Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-21706

Опубликовано: 26 фев. 2022
Источник: nvd
CVSS3: 7.2
CVSS3: 9.8
CVSS2: 7.5
EPSS Низкий

Описание

Zulip is an open-source team collaboration tool with topic-based threading. Zulip Server version 2.0.0 and above are vulnerable to insufficient access control with multi-use invitations. A Zulip Server deployment which hosts multiple organizations is vulnerable to an attack where an invitation created in one organization (potentially as a role with elevated permissions) can be used to join any other organization. This bypasses any restrictions on required domains on users' email addresses, may be used to gain access to organizations which are only accessible by invitation, and may be used to gain access with elevated privileges. This issue has been patched in release 4.10. There are no known workarounds for this issue. ### Patches Has the problem been patched? What versions should users upgrade to? ### Workarounds Is there a way for users to fix or remediate the vulnerability without upgrading? ### References Are there any links users can visit to find out more? ### For more info

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:zulip:zulip_server:*:*:*:*:*:*:*:*
Версия от 2.0.0 (включая) до 4.10.0 (исключая)

EPSS

Процентиль: 34%
0.00138
Низкий

7.2 High

CVSS3

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-284
NVD-CWE-Other

Связанные уязвимости

CVSS3: 7.2
debian
почти 4 года назад

Zulip is an open-source team collaboration tool with topic-based threa ...

EPSS

Процентиль: 34%
0.00138
Низкий

7.2 High

CVSS3

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-284
NVD-CWE-Other