An information disclosure vulnerability exists in Rocket.Chat <v4.7.5 which allowed the "users.list" REST endpoint gets a query parameter from JSON and runs Users.find(queryFromClientSide). This means virtually any authenticated user can access any data (except password hashes) of any user authenticated.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-53420 | An information disclosure vulnerability exists in Rocket.Chat <v4.7.5 which allowed the "users.list" REST endpoint gets a query parameter from JSON and runs Users.find(queryFromClientSide). This means virtually any authenticated user can access any data (except password hashes) of any user authenticated. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://hackerone.com/reports/1140631 |
|
History
Thu, 22 May 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2025-05-22T15:05:22.340Z
Reserved: 2022-06-01T00:00:00.000Z
Link: CVE-2022-32219
Updated: 2024-08-03T07:32:55.995Z
Status : Modified
Published: 2022-09-23T19:15:11.723
Modified: 2025-05-22T15:15:55.403
Link: CVE-2022-32219
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD