Lucene search

K
cve[email protected]CVE-2023-47642
HistoryNov 16, 2023 - 10:15 p.m.

CVE-2023-47642

2023-11-1622:15:28
CWE-200
web.nvd.nist.gov
25
cve-2023-47642
zulip
vulnerability
api
metadata
stream
open-source
collaboration
nvd
security
upgrade

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

4.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

14.0%

Zulip is an open-source team collaboration tool. It was discovered by the Zulip development team that active users who had previously been subscribed to a stream incorrectly continued being able to use the Zulip API to access metadata for that stream. As a result, users who had been removed from a stream, but still had an account in the organization, could still view metadata for that stream (including the stream name, description, settings, and an email address used to send emails into the stream via the incoming email integration). This potentially allowed users to see changes to a stream’s metadata after they had lost access to the stream. This vulnerability has been addressed in version 7.5 and all users are advised to upgrade. There are no known workarounds for this issue.

Affected configurations

Vulners
NVD
Node
zulipzulipRange1.3.0–7.5
VendorProductVersionCPE
zulipzulip*cpe:2.3:a:zulip:zulip:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "zulip",
    "product": "zulip",
    "versions": [
      {
        "version": ">= 1.3.0, < 7.5",
        "status": "affected"
      }
    ]
  }
]

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

4.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

14.0%

Related for CVE-2023-47642