CVE-2024-56136

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-56136
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-56136.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-56136
Aliases
  • GHSA-5xg8-xhfj-4hm6
Published
2025-01-16T19:25:33Z
Modified
2025-11-11T02:50:58.708715Z
Severity
  • 6.9 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
/api/v1/jwt/fetch_api_key endpoint can leak if an email address has an account in Zulip server
Details

Zulip server provides an open-source team chat that helps teams stay productive and focused. Zulip Server 7.0 and above are vulnerable to an information disclose attack, where, if a Zulip server is hosting multiple organizations, an unauthenticated user can make a request and determine if an email address is in use by a user. Zulip Server 9.4 resolves the issue, as does the main branch of Zulip Server. Users are advised to upgrade. There are no known workarounds for this issue.

Database specific
{
    "cwe_ids": [
        "CWE-200"
    ]
}
References

Affected packages

Git / github.com/zulip/zulip

Affected ranges

Type
GIT
Repo
https://github.com/zulip/zulip
Events

Affected versions

7.*

7.0
7.0-beta3
7.0-dev

8.*

8.0
8.0-beta1
8.0-beta2
8.0-dev

9.*

9.0
9.0-beta1
9.0-dev
9.1
9.2
9.3

shared-0.*

shared-0.0.17
shared-0.0.18