First published: Thu Jan 25 2024(Updated: )
Zulip is an open-source team collaboration tool. A vulnerability in version 8.0 is similar to CVE-2023-32677, but applies to multi-use invitations, not single-use invitation links as in the prior CVE. Specifically, it applies when the installation has configured non-admins to be able to invite users and create multi-use invitations, and has also configured only admins to be able to invite users to streams. As in CVE-2023-32677, this does not let users invite new users to arbitrary streams, only to streams that the inviter can already see. Version 8.1 fixes this issue. As a workaround, administrators can limit sending of invitations down to users who also have the permission to add users to streams.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Zulip Server | >=1.9.0<6.2 | |
Zulip Server | >=8.0<8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21630 is classified as a moderate severity vulnerability due to its impact on multi-use invitation management.
To fix CVE-2024-21630, update to Zulip server version 8.1 or later where the vulnerability has been addressed.
CVE-2024-21630 affects installations of Zulip server versions between 1.9.0 and 6.2 and also those within the version 8.0.
The implications of CVE-2024-21630 include the potential for unauthorized access through multi-use invitation links configured for non-admin users.
Yes, CVE-2024-21630 is similar to CVE-2023-32677, but specifically addresses issues with multi-use invitations instead of single-use invitations.