CVE-2022-24751

Zulip is an open source group chat application. Starting with version 4.0 and prior to version 4.11, Zulip is vulnerable to a race condition during account deactivation, where a simultaneous access by the user being deactivated may, in rare cases, allow continued access by the deactivated user. A patch is available in version 4.11 on the 4.x branch and version 5.0-rc1 on the 5.x branch. Upgrading to a fixed version will, as a side effect, deactivate any cached sessions that may have been leaked through this bug. There are currently no known workarounds.
Configurations

Configuration 1 (hide)

cpe:2.3:a:zulip:zulip:*:*:*:*:*:*:*:*

History

22 Mar 2022, 15:25

Type Values Removed Values Added
CPE cpe:2.3:a:zulip:zulip:*:*:*:*:*:*:*:*
First Time Zulip
Zulip zulip
CVSS v2 : unknown
v3 : unknown
v2 : 5.8
v3 : 7.4
References (CONFIRM) https://github.com/zulip/zulip/security/advisories/GHSA-6v98-m5x5-phqj - (CONFIRM) https://github.com/zulip/zulip/security/advisories/GHSA-6v98-m5x5-phqj - Third Party Advisory
References (MISC) https://github.com/zulip/zulip/commit/62ba8e455d8f460001d9fb486a6dabfd1ed67717 - (MISC) https://github.com/zulip/zulip/commit/62ba8e455d8f460001d9fb486a6dabfd1ed67717 - Patch, Third Party Advisory
References (MISC) https://github.com/zulip/zulip/commit/e6eace307ef435eec3395c99247155efed9219e4 - (MISC) https://github.com/zulip/zulip/commit/e6eace307ef435eec3395c99247155efed9219e4 - Patch, Third Party Advisory

16 Mar 2022, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-03-16 14:15

Updated : 2023-12-10 14:22


NVD link : CVE-2022-24751

Mitre link : CVE-2022-24751

CVE.ORG link : CVE-2022-24751


JSON object : View

Products Affected

zulip

  • zulip
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')