
CVE-2022-31122 – Wire-server vulnerable to Token Recipient Confusion resulting in account impersonation, deletion or malicious account creation
https://notcve.org/view.php?id=CVE-2022-31122
18 Oct 2022 — Wire is an encrypted communication and collaboration platform. Versions prior to 2022-07-12/Chart 4.19.0 are subject to Token Recipient Confusion. If an attacker has certain details of SAML IdP metadata, and configures their own SAML on the same backend, the attacker can delete all SAML authenticated accounts of a targeted team, Authenticate as a user of the attacked team and create arbitrary accounts in the context of the team if it is not managed by SCIM. This issue is fixed in wire-server 2022-07-12 and ... • https://github.com/wireapp/wire-server/security/advisories/GHSA-gq27-gmgq-fmxw • CWE-287: Improper Authentication CWE-1270: Generation of Incorrect Security Tokens •

CVE-2021-41119 – DoS vulnerabiliity in wire-server json parser
https://notcve.org/view.php?id=CVE-2021-41119
13 Apr 2022 — Wire-server is the system server for the wire back-end services. Releases prior to v2022-03-01 are subject to a denial of service attack via a crafted object causing a hash collision. This collision causes the server to spend at least quadratic time parsing it which can lead to a denial of service for a heavily used server. The issue has been fixed in wire-server 2022-03-01 and is already deployed on all Wire managed services. On premise instances of wire-server need to be updated to 2022-03-01, so that the... • https://cs-syd.eu/posts/2021-09-11-json-vulnerability • CWE-400: Uncontrolled Resource Consumption •

CVE-2022-23610 – Improper Verification of Cryptographic Signature in wire-server
https://notcve.org/view.php?id=CVE-2022-23610
16 Mar 2022 — wire-server provides back end services for Wire, an open source messenger. In versions of wire-server prior to the 2022-01-27 release, it was possible to craft DSA Signatures to bypass SAML SSO and impersonate any Wire user with SAML credentials. In teams with SAML, but without SCIM, it was possible to create new accounts with fake SAML credentials. Under certain conditions that can be established by an attacker, an upstream library for parsing, rendering, signing, and validating SAML XML data was accepting... • https://github.com/wireapp/wire-server/releases/tag/v2022-01-27 • CWE-347: Improper Verification of Cryptographic Signature •

CVE-2021-41100 – Account takeover when having only access to a user's short lived token in wire-server
https://notcve.org/view.php?id=CVE-2021-41100
04 Oct 2021 — Wire-server is the backing server for the open source wire secure messaging application. In affected versions it is possible to trigger email address change of a user with only the short-lived session token in the `Authorization` header. As the short-lived token is only meant as means of authentication by the client for less critical requests to the backend, the ability to change the email address with a short-lived token constitutes a privilege escalation attack. Since the attacker can change the password ... • https://github.com/wireapp/wire-server/security/advisories/GHSA-9rm2-w6pq-333m • CWE-285: Improper Authorization CWE-613: Insufficient Session Expiration •

CVE-2021-41101 – CORS `Access-Control-Allow-Origin` settings are too lenient
https://notcve.org/view.php?id=CVE-2021-41101
30 Sep 2021 — wire-server is an open-source back end for Wire, a secure collaboration platform. Before version 2.106.0, the CORS ` Access-Control-Allow-Origin ` header set by `nginz` is set for all subdomains of `.wire.com` (including `wire.com`). This means that if somebody were to find an XSS vector in any of the subdomains, they could use it to talk to the Wire API using the user's Cookie. A patch does not exist, but a workaround does. To make sure that a compromise of one subdomain does not yield access to the cookie... • https://github.com/wireapp/wire-server/security/advisories/GHSA-v7xx-cx8m-g66p • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2021-21396 – Bulk list client endpoint exposes too much metadata about a client
https://notcve.org/view.php?id=CVE-2021-21396
26 Mar 2021 — wire-server is an open-source back end for Wire, a secure collaboration platform. In wire-server from version 2021-02-16 and before version 2021-03-02, the client metadata of all users was exposed in the `GET /users/list-clients` endpoint. The endpoint could be used by any logged in user who could request client details of any other user (no connection required) as far as they can find their User ID. The exposed metadata included id, class, type, location, time, and cookie. A user on a Wire backend could us... • https://github.com/wireapp/wire-server/commit/7ba2bf4140282557cf215e0b2c354d4d08cd3421 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •