First published: Wed Mar 16 2022(Updated: )
Zulip is an open source group chat application. Starting with version 4.0 and prior to version 4.11, Zulip is vulnerable to a race condition during account deactivation, where a simultaneous access by the user being deactivated may, in rare cases, allow continued access by the deactivated user. A patch is available in version 4.11 on the 4.x branch and version 5.0-rc1 on the 5.x branch. Upgrading to a fixed version will, as a side effect, deactivate any cached sessions that may have been leaked through this bug. There are currently no known workarounds.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Zulip Zulip | >=4.0<4.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Zulip vulnerability is CVE-2022-24751.
The severity of CVE-2022-24751 is high with a CVSS score of 7.4.
The affected software for CVE-2022-24751 is Zulip version 4.0 to 4.10.
CVE-2022-24751 poses a risk of a race condition during account deactivation, which may allow continued access by a deactivated user.
To fix CVE-2022-24751, upgrade Zulip to version 4.11 or higher.