First published: Wed Apr 14 2021(Updated: )
An issue was discovered in Zulip Server before 3.4. A bug in the implementation of the all_public_streams API feature resulted in guest users being able to receive message traffic to public streams that should have been only accessible to members of the organization.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zulip Server | <3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-30479 is a vulnerability in Zulip Server before version 3.4 that allows guest users to receive message traffic to public streams that should have been only accessible to members of the organization.
The CVE-2021-30479 vulnerability can allow unauthorized guest users to access message traffic meant for members of the organization in Zulip Server before version 3.4.
CVE-2021-30479 has a severity rating of medium with a CVSS score of 5.3.
To fix the CVE-2021-30479 vulnerability, upgrade your Zulip Server installation to version 3.4 or newer.
You can find more information about CVE-2021-30479 in the Zulip Server 3.4 release notes: https://blog.zulip.com/2021/04/14/zulip-server-3-4/