Security Advisory for Zulip <= v4.7

3. March 2022

Our HeroLab analysts have performed a security analysis on the open-source collaboration software Zulip. They identified a server-side request forgery vulnerability that in older versions enabled users to identify open ports on the server itself as well as on systems on the server's local network.

The vulnerability was reported to the vendor and has been fixed in the v4.7 release.

The disclosure of the vulnerabilities is in accordance with usd HeroLab's Responsible Disclosure Policy. Detailed information about this advisory can be found here.

About usd HeroLab Security Advisories

In order to protect businesses against hackers and criminals, we must ensure that our skills and knowledge are up to date at all times. Therefore, security research is just as important to our work as is building up a security community to promote an exchange of knowledge. After all, more security can only be achieved if many people take on the task.

We analyze attack scenarios, which are changing constantly, and publish a series of Security Advisories on current vulnerabilities and security issues – always in line with our Responsible Disclosure Policy.

Always in the name of our mission: “more security.”

Also interesting:

Security Advisories on hugocms and Gitea

The pentest professionals at usd HeroLab examined hugocms and Gitea during their pentests. Thereby, several vulnerabilities were identified. The vulnerabilities were reported to...

read more

Security Advisory on AXIS Webcam

The pentest professionals at usd HeroLab examined the AXIS Webcam (P1364) during their pentests. Our professionals discovered a vulnerability (cross-site request forgery) in the...

read more

Security Advisory on WeKan

The pentest professionals at usd HeroLab examined the open source application WeKan during their pentests. This application offers users a solution for organising projects...

read more