Zulip server provides an open-source team chat that helps teams stay productive and focused. Zulip Server 7.0 and above are vulnerable to an information disclose attack, where, if a Zulip server is hosting multiple organizations, an unauthenticated user can make a request and determine if an email address is in use by a user. Zulip Server 9.4 resolves the issue, as does the `main` branch of Zulip Server. Users are advised to upgrade. There are no known workarounds for this issue.
History

Thu, 06 Feb 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 16 Jan 2025 19:30:00 +0000

Type Values Removed Values Added
Description Zulip server provides an open-source team chat that helps teams stay productive and focused. Zulip Server 7.0 and above are vulnerable to an information disclose attack, where, if a Zulip server is hosting multiple organizations, an unauthenticated user can make a request and determine if an email address is in use by a user. Zulip Server 9.4 resolves the issue, as does the `main` branch of Zulip Server. Users are advised to upgrade. There are no known workarounds for this issue.
Title /api/v1/jwt/fetch_api_key endpoint can leak if an email address has an account in Zulip server
Weaknesses CWE-200
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-01-16T19:25:33.261Z

Updated: 2025-02-06T21:29:12.118Z

Reserved: 2024-12-16T17:30:30.068Z

Link: CVE-2024-56136

cve-icon Vulnrichment

Updated: 2025-01-16T19:50:21.769Z

cve-icon NVD

Status : Received

Published: 2025-01-16T20:15:33.047

Modified: 2025-01-16T20:15:33.047

Link: CVE-2024-56136

cve-icon Redhat

No data.