// For flags

CVE-2024-21630

Zulip non-admins can invite new users to streams they would not otherwise be able to add existing users to

Severity Score

4.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Zulip is an open-source team collaboration tool. A vulnerability in version 8.0 is similar to CVE-2023-32677, but applies to multi-use invitations, not single-use invitation links as in the prior CVE. Specifically, it applies when the installation has configured non-admins to be able to invite users and create multi-use invitations, and has also configured only admins to be able to invite users to streams. As in CVE-2023-32677, this does not let users invite new users to arbitrary streams, only to streams that the inviter can already see. Version 8.1 fixes this issue. As a workaround, administrators can limit sending of invitations down to users who also have the permission to add users to streams.

Zulip es una herramienta de colaboración en equipo de código abierto. Una vulnerabilidad en la versión 8.0 es similar a CVE-2023-32677, pero se aplica a invitaciones de usos múltiples, no a enlaces de invitación de un solo uso como en el CVE anterior. Específicamente, se aplica cuando la instalación ha configurado no administradores para poder invitar a usuarios y crear invitaciones de usos múltiples, y también ha configurado solo administradores para poder invitar a usuarios a transmisiones. Al igual que en CVE-2023-32677, esto no permite a los usuarios invitar a nuevos usuarios a transmisiones arbitrarias, solo a transmisiones que quien invita ya puede ver. La versión 8.1 soluciona este problema. Como workaround, los administradores pueden limitar el envío de invitaciones a los usuarios que también tienen permiso para agregar usuarios a las transmisiones.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-12-29 CVE Reserved
  • 2024-01-25 CVE Published
  • 2024-08-01 CVE Updated
  • 2025-04-15 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-862: Missing Authorization
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Zulip
Search vendor "Zulip"
Zulip Server
Search vendor "Zulip" for product "Zulip Server"
>= 1.9.0 < 6.2
Search vendor "Zulip" for product "Zulip Server" and version " >= 1.9.0 < 6.2"
-
Affected
Zulip
Search vendor "Zulip"
Zulip Server
Search vendor "Zulip" for product "Zulip Server"
>= 8.0 < 8.1
Search vendor "Zulip" for product "Zulip Server" and version " >= 8.0 < 8.1"
-
Affected