First published: Fri Mar 26 2021(Updated: )
wire-server is an open-source back end for Wire, a secure collaboration platform. In wire-server from version 2021-02-16 and before version 2021-03-02, the client metadata of all users was exposed in the `GET /users/list-clients` endpoint. The endpoint could be used by any logged in user who could request client details of any other user (no connection required) as far as they can find their User ID. The exposed metadata included id, class, type, location, time, and cookie. A user on a Wire backend could use this endpoint to find registration time and location for each device for a given list of users. As a workaround, remove `/list-clients` from nginx config. This has been fixed in version 2021-03-02.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wire Wire Server | >=2021-02-16<2021-03-02 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21396 is a vulnerability in wire-server, an open-source back end for Wire, a secure collaboration platform, where the client metadata of all users was exposed in the `GET /users/list-clients` endpoint.
The severity of CVE-2021-21396 is medium, with a CVSS severity score of 6.5.
The CVE-2021-21396 vulnerability can be exploited by any logged in user who can make a request to the `GET /users/list-clients` endpoint.
To fix CVE-2021-21396, it is recommended to upgrade wire-server to version 2021-03-02 or later, as this vulnerability has been addressed in that release.
You can find more information about CVE-2021-21396 in the following references: [link1], [link2], [link3].