CVE-2022-31134
low-risk
Published 2022-07-12
Zulip is an open-source team collaboration tool. Zulip Server versions 2.1.0 above have a user interface tool, accessible only to server owners and server administrators, which provides a way to download a "public data" export. While this export is only accessible to administrators, in many configurations server administrators are not expected to have access to private messages and private streams. However, the "public data" export which administrators could generate contained the attachment contents for all attachments, even those from private messages and streams. Zulip Server version 5.4 contains a patch for this issue.
Do I need to act?
-
0.40% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
4
CVSS 4.9/10
Medium
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (6)
Vendor Advisory
https://blog.zulip.com/2022/07/12/zulip-cloud-data-exports
Vendor Advisory
https://blog.zulip.com/2022/07/12/zulip-cloud-data-exports
27
/ 100
low-risk
Severity
20/34 · Moderate
Exploitability
2/34 · Minimal
Exposure
5/34 · Minimal