First published: Wed Aug 31 2022(Updated: )
Zulip is an open-source team collaboration tool with topic-based threading that combines email and chat. When displaying messages with embedded remote images, Zulip normally loads the image preview via a go-camo proxy server. However, an attacker who can send messages could include a crafted URL that tricks the server into embedding a remote image reference directly. This could allow the attacker to infer the viewer’s IP address and browser fingerprinting information. This vulnerability is fixed in Zulip Server 5.6. Zulip organizations with image and link previews [disabled](https://zulip.com/help/allow-image-link-previews) are not affected.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Zulip Desktop | <5.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36048 is a vulnerability in Zulip, an open-source team collaboration tool, that allows an attacker to include a crafted URL in a message, leading to potential remote image loading bypass.
CVE-2022-36048 impacts Zulip by allowing attackers to bypass the go-camo proxy server and load remote images by including a crafted URL in messages.
CVE-2022-36048 has a severity rating of medium, with a CVSS score of 4.3.
To fix CVE-2022-36048 in Zulip, update to version 5.6 or higher, as this vulnerability is fixed in that version.
More information about CVE-2022-36048 can be found at the following reference: https://github.com/zulip/zulip/security/advisories/GHSA-vg5m-mf9x-j452