// For flags

CVE-2022-31134

Zulip Server public data export contains attachments that are non-public

Severity Score

4.9
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Zulip is an open-source team collaboration tool. Zulip Server versions 2.1.0 above have a user interface tool, accessible only to server owners and server administrators, which provides a way to download a "public data" export. While this export is only accessible to administrators, in many configurations server administrators are not expected to have access to private messages and private streams. However, the "public data" export which administrators could generate contained the attachment contents for all attachments, even those from private messages and streams. Zulip Server version 5.4 contains a patch for this issue.

Zulip es una herramienta de colaboración en equipo de código abierto. Zulip Server versiones 2.1.0, presentan una herramienta de interfaz de usuario, accesible sólo para los propietarios y administradores del servidor, que proporciona una forma de descargar una exportación de "datos públicos". Aunque esta exportación sólo es accesible para administradores, en muchas configuraciones no es esperado que los administradores del servidor tengan acceso a los mensajes privados y a los flujos privados. Sin embargo, la exportación de "datos públicos" que los administradores podían generar contenía el contenido de todos los archivos adjuntos, incluso los de los mensajes y flujos privados. Zulip Server versión 5.4 contiene un parche para este problema

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-05-18 CVE Reserved
  • 2022-07-12 CVE Published
  • 2024-08-03 CVE Updated
  • 2025-04-06 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
  • CWE-434: Unrestricted Upload of File with Dangerous Type
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Zulip
Search vendor "Zulip"
Zulip Server
Search vendor "Zulip" for product "Zulip Server"
>= 2.1.0 < 5.4
Search vendor "Zulip" for product "Zulip Server" and version " >= 2.1.0 < 5.4"
-
Affected