Zulip is an open-source team collaboration tool. For organizations with System for Cross-domain Identity Management(SCIM) account management enabled, Zulip Server 5.0 through 5.6 checked the SCIM bearer token using a comparator that did not run in constant time. Therefore, it might theoretically be possible for an attacker to infer the value of the token by performing a sophisticated timing analysis on a large number of failing requests. If successful, this would allow the attacker to impersonate the SCIM client for its abilities to read and update user accounts in the Zulip organization. Organizations where SCIM account management has not been enabled are not affected.
History

Wed, 23 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2022-11-16T00:00:00.000Z

Updated: 2025-04-23T16:36:55.819Z

Reserved: 2022-09-30T00:00:00.000Z

Link: CVE-2022-41914

cve-icon Vulnrichment

Updated: 2024-08-03T12:56:38.364Z

cve-icon NVD

Status : Modified

Published: 2022-11-16T20:15:10.580

Modified: 2024-11-21T07:24:03.447

Link: CVE-2022-41914

cve-icon Redhat

No data.