Zulip server provides an open-source team chat that helps teams stay productive and focused. Zulip Server 7.0 and above are vulnerable to an information disclose attack, where, if a Zulip server is hosting multiple organizations, an unauthenticated user can make a request and determine if an email address is in use by a user. Zulip Server 9.4 resolves the issue, as does the `main` branch of Zulip Server. Users are advised to upgrade. There are no known workarounds for this issue.
Metrics
Affected Vendors & Products
References
History
Thu, 06 Feb 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 16 Jan 2025 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Zulip server provides an open-source team chat that helps teams stay productive and focused. Zulip Server 7.0 and above are vulnerable to an information disclose attack, where, if a Zulip server is hosting multiple organizations, an unauthenticated user can make a request and determine if an email address is in use by a user. Zulip Server 9.4 resolves the issue, as does the `main` branch of Zulip Server. Users are advised to upgrade. There are no known workarounds for this issue. | |
Title | /api/v1/jwt/fetch_api_key endpoint can leak if an email address has an account in Zulip server | |
Weaknesses | CWE-200 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-01-16T19:25:33.261Z
Updated: 2025-02-06T21:29:12.118Z
Reserved: 2024-12-16T17:30:30.068Z
Link: CVE-2024-56136

Updated: 2025-01-16T19:50:21.769Z

Status : Received
Published: 2025-01-16T20:15:33.047
Modified: 2025-01-16T20:15:33.047
Link: CVE-2024-56136

No data.