Shared security patch analysis results
AI Used: deepseek deepseek-chat--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/apps/meteor/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/apps/meteor/CHANGELOG.md@@ -1,4 +1,49 @@ # @rocket.chat/meteor++## 7.7.2++### Patch Changes++- Bump @rocket.chat/meteor version.++- Bump @rocket.chat/meteor version.++- ([#36323](https://github.com/RocketChat/Rocket.Chat/pull/36323) by [@dionisio-bot](https://github.com/dionisio-bot)) Fixes an issue that was causing ddp-streamer process to break if the communication with presence service was interrupted for any reason.++- ([#36250](https://github.com/RocketChat/Rocket.Chat/pull/36250) by [@dionisio-bot](https://github.com/dionisio-bot)) fix: Security Hotfix (https://docs.rocket.chat/docs/security-fixes-and-updates)++- ([#36270](https://github.com/RocketChat/Rocket.Chat/pull/36270) by [@dionisio-bot](https://github.com/dionisio-bot)) Fixes an issue that caused the queue worker to stop processing if something failed when checking MAC limits or while fetching the list of queues++- ([#36298](https://github.com/RocketChat/Rocket.Chat/pull/36298) by [@dionisio-bot](https://github.com/dionisio-bot)) Fixes an issue that prevented the action of removing an agent when editing a department to work.++- <details><summary>Updated dependencies [8874a5aab72c962f213d128a54393d95f7dabef8]:</summary>++ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ </details> ## 7.7.1
Based on the provided code diff from the CHANGELOG.md file, I can identify one security-related fix:
Vulnerability Existed: yes
Security Hotfix [apps/meteor/CHANGELOG.md] [Lines 10-11]
[No old code - this is an addition to the changelog]
- ([#36250](https://github.com/RocketChat/Rocket.Chat/pull/36250) by [@dionisio-bot](https://github.com/dionisio-bot)) fix: Security Hotfix (https://docs.rocket.chat/docs/security-fixes-and-updates)
Note: The changelog entry indicates a security fix was made, but the specific vulnerability name is not provided in this diff. The entry references a security hotfix and links to Rocket.Chat's security documentation for more details.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/apps/meteor/app/livechat/server/lib/departmentsLib.ts+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/apps/meteor/app/livechat/server/lib/departmentsLib.ts@@ -185,7 +185,7 @@ departmentAgents: { upsert?: (Pick<ILivechatDepartmentAgents, 'agentId' | 'username'> & { count?: number;- sort?: number;+ order?: number; })[]; remove?: Pick<ILivechatDepartmentAgents, 'agentId' | 'username'>[]; },
Vulnerability Existed: not sure No Specific Vulnerability Name apps/meteor/app/livechat/server/lib/departmentsLib.ts 185 [Old Code] ```typescript sort?: number; ``` [Fixed Code] ```typescript order?: number; ```
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/apps/meteor/app/utils/rocketchat.info+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/apps/meteor/app/utils/rocketchat.info@@ -1,3 +1,3 @@ {- "version": "7.7.1"+ "version": "7.7.2" }
Vulnerability Existed: not sure
No specific vulnerability identified apps/meteor/app/utils/rocketchat.info 1
Old Code:
```json
{
"version": "7.7.1"
}
```
Fixed Code:
```json
{
"version": "7.7.2"
}
```
Note: This diff only shows a version number update. Without additional context, it's unclear if this change addresses a specific vulnerability. Version bumps can sometimes indicate security patches, but the diff alone doesn't reveal any security-related code changes.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/apps/meteor/client/views/omnichannel/departments/utils/formatAgentListPayload.ts+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/apps/meteor/client/views/omnichannel/departments/utils/formatAgentListPayload.ts@@ -1,20 +1,20 @@ import type { IDepartmentAgent } from '../definitions'; export const formatAgentListPayload = (oldAgentList: IDepartmentAgent[], newAgentList: IDepartmentAgent[]) => {- const upsert: IDepartmentAgent[] = [];- const remove: IDepartmentAgent[] = [];+ const upsert: Pick<IDepartmentAgent, 'agentId' | 'username' | 'count' | 'order'>[] = [];+ const remove: Pick<IDepartmentAgent, 'agentId' | 'username'>[] = []; for (const agent of newAgentList) { const initialAgent = agent._id ? oldAgentList.find((initialAgent) => initialAgent._id === agent._id) : undefined; if (!initialAgent || agent.count !== initialAgent.count || agent.order !== initialAgent.order) {- upsert.push(agent);+ upsert.push({ agentId: agent.agentId, username: agent.username, count: agent.count, order: agent.order }); } } for (const initialAgent of oldAgentList) { if (!newAgentList.some((agent) => initialAgent._id === agent._id)) {- remove.push(initialAgent);+ remove.push({ agentId: initialAgent.agentId, username: initialAgent.username }); } }
Vulnerability Existed: yes
Information Exposure [File] [Lines 2-3, 8, 14]
[Old Code]
```typescript
const upsert: IDepartmentAgent[] = [];
const remove: IDepartmentAgent[] = [];
```
[Fixed Code]
```typescript
const upsert: Pick<IDepartmentAgent, 'agentId' | 'username' | 'count' | 'order'>[] = [];
const remove: Pick<IDepartmentAgent, 'agentId' | 'username'>[] = [];
```
Vulnerability Existed: yes
Information Exposure [File] [Lines 8, 14]
[Old Code]
```typescript
upsert.push(agent);
remove.push(initialAgent);
```
[Fixed Code]
```typescript
upsert.push({ agentId: agent.agentId, username: agent.username, count: agent.count, order: agent.order });
remove.push({ agentId: initialAgent.agentId, username: initialAgent.username });
```
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/apps/meteor/ee/server/services/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/apps/meteor/ee/server/services/CHANGELOG.md@@ -1,4 +1,18 @@ # rocketchat-services++## 2.0.17++### Patch Changes++- <details><summary>Updated dependencies [8874a5aab72c962f213d128a54393d95f7dabef8]:</summary>++ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ </details> ## 2.0.16
Looking at the provided diff, I can see that this is a changelog file update showing dependency version bumps. There is no actual code change shown - only documentation of updated package versions. Since this is a changelog file (CHANGELOG.md) and not source code, and the diff only shows dependency version updates without any actual code modifications, there are no security vulnerabilities to analyze in this specific diff. Vulnerability Existed: no No code changes in CHANGELOG.md N/A N/A The diff shows that various dependencies were updated from unspecified previous versions to: - @rocket.chat/[email protected] - @rocket.chat/[email protected] - @rocket.chat/[email protected] - @rocket.chat/[email protected] - @rocket.chat/[email protected] - @rocket.chat/[email protected] However, without seeing the actual code changes in those dependencies or the previous vulnerable versions, I cannot identify any specific vulnerabilities from this changelog entry alone.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/apps/meteor/ee/server/services/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/apps/meteor/ee/server/services/package.json@@ -1,7 +1,7 @@ { "name": "rocketchat-services", "private": true,- "version": "2.0.16",+ "version": "2.0.17", "description": "Rocket.Chat Authorization service", "main": "index.js", "scripts": {
Vulnerability Existed: not sure [No specific vulnerability name identified] [apps/meteor/ee/server/services/package.json] [Lines 4] [Old Code] "version": "2.0.16", [Fixed Code] "version": "2.0.17",
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/apps/meteor/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/apps/meteor/package.json@@ -1,7 +1,7 @@ { "name": "@rocket.chat/meteor", "description": "The Ultimate Open Source WebChat Platform",- "version": "7.7.1",+ "version": "7.7.2", "private": true, "type": "commonjs", "author": {
Looking at the provided diff, I can only see a version number change in the package.json file. There are no actual code changes that would indicate a security vulnerability fix. Vulnerability Existed: no No vulnerability found apps/meteor/package.json Lines 1-7 - "version": "7.7.1", + "version": "7.7.2", The diff only shows a version bump from 7.7.1 to 7.7.2, which is typical for releases that may include security fixes, but without seeing the actual code changes in other files, I cannot identify any specific vulnerabilities from this limited diff content.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/apps/meteor/server/publications/room/index.ts+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/apps/meteor/server/publications/room/index.ts@@ -58,11 +58,15 @@ } const userId = Meteor.userId();+ const isAnonymous = !userId;- if (!userId && settings.get('Accounts_AllowAnonymousRead') === false) {- throw new Meteor.Error('error-invalid-user', 'Invalid user', {- method: 'getRoomByTypeAndName',- });+ if (isAnonymous) {+ const allowAnon = settings.get('Accounts_AllowAnonymousRead');+ if (!allowAnon || type !== 'c') {+ throw new Meteor.Error('error-invalid-user', 'Invalid user', {+ method: 'getRoomByTypeAndName',+ });+ } } const roomFind = roomCoordinator.getRoomFind(type);
Vulnerability Existed: yes
Information Exposure Through Anonymous Access [File] [Lines 58-68]
[Old Code]
```typescript
const userId = Meteor.userId();
if (!userId && settings.get('Accounts_AllowAnonymousRead') === false) {
throw new Meteor.Error('error-invalid-user', 'Invalid user', {
method: 'getRoomByTypeAndName',
});
}
```
[Fixed Code]
```typescript
const userId = Meteor.userId();
const isAnonymous = !userId;
if (isAnonymous) {
const allowAnon = settings.get('Accounts_AllowAnonymousRead');
if (!allowAnon || type !== 'c') {
throw new Meteor.Error('error-invalid-user', 'Invalid user', {
method: 'getRoomByTypeAndName',
});
}
}
```
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/apps/meteor/server/services/omnichannel/queue.ts+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/apps/meteor/server/services/omnichannel/queue.ts@@ -27,6 +27,8 @@ private running = false;+ private errorDelay = 10 * 1000; // 10 seconds+ private delay() { const timeout = settings.get<number>('Omnichannel_queue_delay_timeout') ?? 5; return timeout < 1 ? DEFAULT_RACE_TIMEOUT : timeout * 1000;@@ -79,28 +81,38 @@ } private async execute() {- if (!this.running) {- queueLogger.debug('Queue stopped. Cannot execute');- return;- }-- if (await License.shouldPreventAction('monthlyActiveContacts', 1)) {- queueLogger.debug('MAC limit reached. Queue wont execute');- this.running = false;- return;- }-- // We still go 1 by 1, but we go with every queue every cycle instead of just 1 queue per cycle- // And we get tracing :)- const queues = await this.getActiveQueues();- for await (const queue of queues) {- await tracerSpan(- 'omnichannel.queue',- { attributes: { workerTime: new Date().toISOString(), queue: queue || 'Public' }, root: true },- () => this.checkQueue(queue),- );- }- this.scheduleExecution();+ try {+ if (!this.running) {+ queueLogger.debug('Queue stopped. Cannot execute');+ return;+ }++ if (await License.shouldPreventAction('monthlyActiveContacts', 1)) {+ queueLogger.debug('MAC limit reached. Queue wont execute');+ this.running = false;+ return;+ }++ // We still go 1 by 1, but we go with every queue every cycle instead of just 1 queue per cycle+ // And we get tracing :)+ const queues = await this.getActiveQueues();+ for await (const queue of queues) {+ await tracerSpan(+ 'omnichannel.queue',+ { attributes: { workerTime: new Date().toISOString(), queue: queue || 'Public' }, root: true },+ () => this.checkQueue(queue),+ );+ }++ this.scheduleExecution();+ } catch (e) {+ queueLogger.error({+ msg: 'Queue Worker Error. Rescheduling with extra delay',+ extraDelay: this.errorDelay,+ err: e,+ });+ this.scheduleExecution(this.errorDelay);+ } } private async checkQueue(queue: string | null) {@@ -136,15 +148,18 @@ } }- private scheduleExecution(): void {+ private scheduleExecution(extraDelay?: number): void { if (this.timeoutHandler !== null) { return; }- this.timeoutHandler = setTimeout(() => {- this.timeoutHandler = null;- return this.execute();- }, this.delay());+ this.timeoutHandler = setTimeout(+ () => {+ this.timeoutHandler = null;+ return this.execute();+ },+ this.delay() + (extraDelay || 0),+ ); } async shouldStart() {
Vulnerability Existed: not sure
Uncaught Exception in Queue Worker [apps/meteor/server/services/omnichannel/queue.ts] [79-112]
[Old Code]
```typescript
private async execute() {
if (!this.running) {
queueLogger.debug('Queue stopped. Cannot execute');
return;
}
if (await License.shouldPreventAction('monthlyActiveContacts', 1)) {
queueLogger.debug('MAC limit reached. Queue wont execute');
this.running = false;
return;
}
// We still go 1 by 1, but we go with every queue every cycle instead of just 1 queue per cycle
// And we get tracing :)
const queues = await this.getActiveQueues();
for await (const queue of queues) {
await tracerSpan(
'omnichannel.queue',
{ attributes: { workerTime: new Date().toISOString(), queue: queue || 'Public' }, root: true },
() => this.checkQueue(queue),
);
}
this.scheduleExecution();
}
```
[Fixed Code]
```typescript
private async execute() {
try {
if (!this.running) {
queueLogger.debug('Queue stopped. Cannot execute');
return;
}
if (await License.shouldPreventAction('monthlyActiveContacts', 1)) {
queueLogger.debug('MAC limit reached. Queue wont execute');
this.running = false;
return;
}
// We still go 1 by 1, but we go with every queue every cycle instead of just 1 queue per cycle
// And we get tracing :)
const queues = await this.getActiveQueues();
for await (const queue of queues) {
await tracerSpan(
'omnichannel.queue',
{ attributes: { workerTime: new Date().toISOString(), queue: queue || 'Public' }, root: true },
() => this.checkQueue(queue),
);
}
this.scheduleExecution();
} catch (e) {
queueLogger.error({
msg: 'Queue Worker Error. Rescheduling with extra delay',
extraDelay: this.errorDelay,
err: e,
});
this.scheduleExecution(this.errorDelay);
}
}
```
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/apps/meteor/tests/end-to-end/api/livechat/10-departments.ts+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/apps/meteor/tests/end-to-end/api/livechat/10-departments.ts@@ -911,6 +911,30 @@ .send({ upsert: [{ agentId: agent._id, username: agent.username, name: agent.name }], remove: [] }) .expect(200); expect(res.body).to.have.property('success', true);+ });+ it('should successfully remove an agent from a department', async () => {+ const [dep, agent] = await Promise.all([createDepartment(), createAgent()]);+ const res = await request+ .post(api(`livechat/department/${dep._id}/agents`))+ .set(credentials)+ // UI sends the whole agent object, but API only needs agentId and username+ .send({+ remove: [+ {+ agentId: agent._id,+ username: agent.username,+ name: agent.name,+ count: 0,+ order: 0,+ departmentId: 'afdsfads',+ _id: 'afsdfadsfaf',+ _updatedAt: new Date(),+ },+ ],+ upsert: [],+ })+ .expect(200);+ expect(res.body).to.have.property('success', true); await deleteDepartment(dep._id); }); });
Based on the provided code diff, I cannot identify any security vulnerabilities. The changes appear to be adding a new test case for department agent removal functionality. Vulnerability Existed: no No security vulnerability identified File: apps/meteor/tests/end-to-end/api/livechat/10-departments.ts Lines: Added test case at lines 914-938 This is a test addition that verifies the API endpoint for removing agents from departments works correctly with various agent object properties, but doesn't represent a security fix in the application code itself. The diff shows: - Addition of a new test case 'should successfully remove an agent from a department' - The test creates a department and agent, then sends a POST request to remove the agent - The test payload includes various agent properties beyond what the API strictly needs (agentId and username) - This appears to be testing the API's robustness in handling extra fields in the request Since this is only modifying test code and not production application code, there are no security vulnerabilities being fixed in this diff.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/apps/meteor/tests/end-to-end/api/methods.ts+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/apps/meteor/tests/end-to-end/api/methods.ts@@ -2575,6 +2575,7 @@ let testUserCredentials: Credentials; let dmId: IRoom['_id']; let room: IRoom;+ let privateRoom: IRoom; before(async () => { testUser = await createUser();@@ -2613,14 +2614,49 @@ }); });- after(() =>- Promise.all([+ before(async () => {+ privateRoom = (+ await createRoom({+ type: 'p',+ name: `private.test.${Date.now()}-${Math.random()}`,+ })+ ).body.group;+ });++ after(async () => {+ await Promise.all([ deleteRoom({ type: 'd', roomId: dmId }), deleteRoom({ type: 'c', roomId: room._id }),+ deleteRoom({ type: 'p', roomId: privateRoom._id }), deleteUser(testUser), deleteUser(testUser2),- ]),- );+ updateSetting('Accounts_AllowAnonymousRead', false),+ ]);+ });++ it('should throw error when anonymous user tries to read private channel with anonymous read enabled', async () => {+ await updateSetting('Accounts_AllowAnonymousRead', true);++ const payload = {+ message: JSON.stringify({+ msg: 'method',+ id: '2',+ method: 'getRoomByTypeAndName',+ params: ['p', privateRoom.name],+ }),+ };++ const res = await request.post('/api/v1/method.callAnon/getRoomByTypeAndName').set('Content-Type', 'application/json').send(payload);++ expect(res.body).to.have.property('message');+ const parsedMessage = JSON.parse(res.body.message);++ expect(parsedMessage).to.have.property('error');+ expect(parsedMessage.error).to.have.property('error');+ expect(parsedMessage.error.error).to.equal('error-invalid-user');++ await updateSetting('Accounts_AllowAnonymousRead', false);+ }); it("should throw an error if the user isn't logged in", (done) => { void request
Vulnerability Existed: yes
CWE-285: Improper Authorization [File] [Lines 2613-2649]
[Old Code]
```typescript
// No test case for anonymous access to private rooms with anonymous read enabled
```
[Fixed Code]
```typescript
it('should throw error when anonymous user tries to read private channel with anonymous read enabled', async () => {
await updateSetting('Accounts_AllowAnonymousRead', true);
const payload = {
message: JSON.stringify({
msg: 'method',
id: '2',
method: 'getRoomByTypeAndName',
params: ['p', privateRoom.name],
}),
};
const res = await request.post('/api/v1/method.callAnon/getRoomByTypeAndName').set('Content-Type', 'application/json').send(payload);
expect(res.body).to.have.property('message');
const parsedMessage = JSON.parse(res.body.message);
expect(parsedMessage).to.have.property('error');
expect(parsedMessage.error).to.have.property('error');
expect(parsedMessage.error.error).to.equal('error-invalid-user');
await updateSetting('Accounts_AllowAnonymousRead', false);
});
```
Vulnerability Existed: yes
CWE-863: Incorrect Authorization [File] [Lines 2628-2634]
[Old Code]
```typescript
after(() =>
Promise.all([
deleteRoom({ type: 'd', roomId: dmId }),
deleteRoom({ type: 'c', roomId: room._id }),
deleteUser(testUser),
deleteUser(testUser2),
]),
);
```
[Fixed Code]
```typescript
after(async () => {
await Promise.all([
deleteRoom({ type: 'd', roomId: dmId }),
deleteRoom({ type: 'c', roomId: room._id }),
deleteRoom({ type: 'p', roomId: privateRoom._id }),
deleteUser(testUser),
deleteUser(testUser2),
updateSetting('Accounts_AllowAnonymousRead', false),
]);
});
```
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/apps/uikit-playground/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/apps/uikit-playground/CHANGELOG.md@@ -1,4 +1,16 @@ # @rocket.chat/uikit-playground++## 0.6.17++### Patch Changes++- <details><summary>Updated dependencies []:</summary>++ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ </details> ## 0.6.16
Based on the provided diff, I cannot identify any security vulnerabilities as it only shows a changelog update with dependency version bumps. Vulnerability Existed: no No security vulnerability identified in this changelog update [File: apps/uikit-playground/CHANGELOG.md] [Lines: 1-16] [Old Code: Initial changelog content] [Fixed Code: Added version 0.6.17 with updated dependency versions] Note: This diff only shows documentation changes (CHANGELOG.md) with dependency version updates. No actual code changes are present that would indicate security fixes. The dependency version bumps might include security patches, but the diff itself doesn't reveal any specific vulnerabilities.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/apps/uikit-playground/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/apps/uikit-playground/package.json@@ -1,7 +1,7 @@ { "name": "@rocket.chat/uikit-playground", "private": true,- "version": "0.6.16",+ "version": "0.6.17", "type": "module", "scripts": { "dev": "vite",
Vulnerability Existed: not sure
No specific vulnerability identified apps/uikit-playground/package.json 3-4
```json
- "version": "0.6.16",
+ "version": "0.6.17",
```
Vulnerability Existed: not sure
No specific vulnerability identified apps/uikit-playground/package.json 1-7
```json
{
"name": "@rocket.chat/uikit-playground",
"private": true,
- "version": "0.6.16",
+ "version": "0.6.17",
"type": "module",
"scripts": {
"dev": "vite",
```
Note: The diff only shows a version bump from 0.6.16 to 0.6.17 in the package.json file. Without additional context about what changed between these versions, it's impossible to determine if any security vulnerabilities were fixed. Version bumps often include security patches, but they can also include feature additions, bug fixes, or other improvements.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/ee/apps/account-service/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/ee/apps/account-service/CHANGELOG.md@@ -1,4 +1,18 @@ # @rocket.chat/account-service++## 0.4.26++### Patch Changes++- <details><summary>Updated dependencies [8874a5aab72c962f213d128a54393d95f7dabef8]:</summary>++ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ </details> ## 0.4.25
Based on the provided diff, I cannot identify any specific security vulnerabilities as the changes only show version updates in a changelog file without any code modifications.
Vulnerability Existed: no
No code changes to analyze [ee/apps/account-service/CHANGELOG.md] [Lines 1-18]
# @rocket.chat/account-service
# @rocket.chat/account-service
+
+## 0.4.26
+
+### Patch Changes
+
+- <details><summary>Updated dependencies [8874a5aab72c962f213d128a54393d95f7dabef8]:</summary>
+
+ - @rocket.chat/[email protected]
+ - @rocket.chat/[email protected]
+ - @rocket.chat/[email protected]
+ - @rocket.chat/[email protected]
+ - @rocket.chat/[email protected]
+ - @rocket.chat/[email protected]
+ </details>
+
+## 0.4.25
The diff only shows an update to the changelog file documenting dependency version bumps from 0.4.25 to 0.4.26. No actual source code changes are present that could introduce or fix security vulnerabilities.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/ee/apps/account-service/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/ee/apps/account-service/package.json@@ -1,7 +1,7 @@ { "name": "@rocket.chat/account-service", "private": true,- "version": "0.4.25",+ "version": "0.4.26", "description": "Rocket.Chat Account service", "scripts": { "build": "tsc -p tsconfig.json",
Vulnerability Existed: not sure No specific vulnerability identified ee/apps/account-service/package.json 3 Old Code: "version": "0.4.25", Fixed Code: "version": "0.4.26",
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/ee/apps/authorization-service/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/ee/apps/authorization-service/CHANGELOG.md@@ -1,4 +1,18 @@ # @rocket.chat/authorization-service++## 0.4.26++### Patch Changes++- <details><summary>Updated dependencies [8874a5aab72c962f213d128a54393d95f7dabef8]:</summary>++ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ </details> ## 0.4.25
Based on the provided code diff, I cannot identify any specific security vulnerabilities as this is a changelog file update showing dependency version bumps rather than actual code changes.
Vulnerability Existed: no
No vulnerability identified ee/apps/authorization-service/CHANGELOG.md 1-18
# @rocket.chat/authorization-service
# @rocket.chat/authorization-service
+
+## 0.4.26
+
+### Patch Changes
+
+- <details><summary>Updated dependencies [8874a5aab72c962f213d128a54393d95f7dabef8]:</summary>
+
+ - @rocket.chat/[email protected]
+ - @rocket.chat/[email protected]
+ - @rocket.chat/[email protected]
+ - @rocket.chat/[email protected]
+ - @rocket.chat/[email protected]
+ - @rocket.chat/[email protected]
+ </details>
+
+## 0.4.25
Note: This diff only shows version updates in a changelog file. To identify actual security vulnerabilities, I would need to see the actual code changes in the source files rather than just dependency version updates in a changelog.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/ee/apps/authorization-service/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/ee/apps/authorization-service/package.json@@ -1,7 +1,7 @@ { "name": "@rocket.chat/authorization-service", "private": true,- "version": "0.4.25",+ "version": "0.4.26", "description": "Rocket.Chat Authorization service", "scripts": { "build": "tsc -p tsconfig.json",
Vulnerability Existed: not sure No specific vulnerability identified in this diff ee/apps/authorization-service/package.json 1 - "version": "0.4.25", + "version": "0.4.26",
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/ee/apps/ddp-streamer/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/ee/apps/ddp-streamer/CHANGELOG.md@@ -1,4 +1,21 @@ # @rocket.chat/ddp-streamer++## 0.3.26++### Patch Changes++- ([#36323](https://github.com/RocketChat/Rocket.Chat/pull/36323) by [@dionisio-bot](https://github.com/dionisio-bot)) Fixes an issue that was causing ddp-streamer process to break if the communication with presence service was interrupted for any reason.++- <details><summary>Updated dependencies [8874a5aab72c962f213d128a54393d95f7dabef8]:</summary>++ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ </details> ## 0.3.25
Based on the provided diff content, I cannot identify any specific security vulnerabilities. The changes shown are in a CHANGELOG.md file which documents version updates and dependency changes, but does not contain actual code changes that would reveal security fixes.
Vulnerability Existed: not sure
No specific vulnerability identified ee/apps/ddp-streamer/CHANGELOG.md 1-21
# @rocket.chat/ddp-streamer
# @rocket.chat/ddp-streamer
+
+## 0.3.26
+
+### Patch Changes
+
+- ([#36323](https://github.com/RocketChat/Rocket.Chat/pull/36323) by [@dionisio-bot](https://github.com/dionisio-bot)) Fixes an issue that was causing ddp-streamer process to break if the communication with presence service was interrupted for any reason.
+
+- <details><summary>Updated dependencies [8874a5aab72c962f213d128a54393d95f7dabef8]:</summary>
+
+ - @rocket.chat/[email protected]
+ - @rocket.chat/[email protected]
+ - @rocket.chat/[email protected]
+ - @rocket.chat/[email protected]
+ - @rocket.chat/[email protected]
+ - @rocket.chat/[email protected]
+ - @rocket.chat/[email protected]
+ </details>
+
+## 0.3.25
Note: The changelog mentions a fix for an issue where "ddp-streamer process to break if the communication with presence service was interrupted", which could potentially relate to availability/DoS concerns, but without seeing the actual code changes, I cannot confirm if this constitutes a security vulnerability.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/ee/apps/ddp-streamer/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/ee/apps/ddp-streamer/package.json@@ -1,7 +1,7 @@ { "name": "@rocket.chat/ddp-streamer", "private": true,- "version": "0.3.25",+ "version": "0.3.26", "description": "Rocket.Chat DDP-Streamer service", "scripts": { "build": "tsc -p tsconfig.json",
Vulnerability Existed: not sure No specific vulnerability identified in this diff File: ee/apps/ddp-streamer/package.json Lines: Version number change only Old Code: "version": "0.3.25" Fixed Code: "version": "0.3.26" Note: This diff only shows a version number increment from 0.3.25 to 0.3.26 in the package.json file. Without additional context about what changes were made in this version, I cannot identify any specific security vulnerability that was fixed. Version bumps often include security patches, but the diff content provided doesn't show any dependency updates or code changes that would indicate a specific vulnerability.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/ee/apps/ddp-streamer/src/service.ts+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/ee/apps/ddp-streamer/src/service.ts@@ -32,3 +32,39 @@ await api.start(); })();++/**+ * If some promise is rejected and doesn't have a catch (unhandledRejection) it may cause the process to exit.+ *+ * Since unhandled rejections are deprecated in NodeJS:+ * (node:83382) [DEP0018] DeprecationWarning: Unhandled promise rejections are deprecated. In the future, promise rejections+ * that are not handled will terminate the Node.js process with a non-zero exit code.+ * we will start respecting this and exit the process to prevent these kind of problems.+ */++process.on('unhandledRejection', (error) => {+ console.error('=== UnHandledPromiseRejection ===');+ console.error(error);+ console.error('---------------------------------');+ console.error(+ 'Setting EXIT_UNHANDLEDPROMISEREJECTION will cause the process to exit allowing your service to automatically restart the process',+ );+ console.error('Future node.js versions will automatically exit the process');+ console.error('=================================');++ if (process.env.TEST_MODE || process.env.NODE_ENV === 'development' || process.env.EXIT_UNHANDLEDPROMISEREJECTION) {+ process.exit(1);+ }+});++process.on('uncaughtException', async (error) => {+ console.error('=== UnCaughtException ===');+ console.error(error);+ console.error('-------------------------');+ console.error('Errors like this can cause oplog processing errors.');+ console.error('===========================');++ if (process.env.TEST_MODE || process.env.NODE_ENV === 'development' || process.env.EXIT_UNHANDLEDPROMISEREJECTION) {+ process.exit(1);+ }+});
Vulnerability Existed: not sure
Unhandled Promise Rejection and Uncaught Exception Handling [ee/apps/ddp-streamer/src/service.ts] [Lines 32-39]
[Old Code]
```typescript
// No previous error handling for unhandled promise rejections or uncaught exceptions
```
[Fixed Code]
```typescript
process.on('unhandledRejection', (error) => {
console.error('=== UnHandledPromiseRejection ===');
console.error(error);
console.error('---------------------------------');
console.error(
'Setting EXIT_UNHANDLEDPROMISEREJECTION will cause the process to exit allowing your service to automatically restart the process',
);
console.error('Future node.js versions will automatically exit the process');
console.error('=================================');
if (process.env.TEST_MODE || process.env.NODE_ENV === 'development' || process.env.EXIT_UNHANDLEDPROMISEREJECTION) {
process.exit(1);
}
});
process.on('uncaughtException', async (error) => {
console.error('=== UnCaughtException ===');
console.error(error);
console.error('-------------------------');
console.error('Errors like this can cause oplog processing errors.');
console.error('===========================');
if (process.env.TEST_MODE || process.env.NODE_ENV === 'development' || process.env.EXIT_UNHANDLEDPROMISEREJECTION) {
process.exit(1);
}
});
```
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/ee/apps/omnichannel-transcript/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/ee/apps/omnichannel-transcript/CHANGELOG.md@@ -1,4 +1,19 @@ # @rocket.chat/omnichannel-transcript++## 0.4.26++### Patch Changes++- <details><summary>Updated dependencies []:</summary>++ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ </details> ## 0.4.25
Based on the provided diff, I cannot identify any specific security vulnerabilities as the changes only show version updates in a changelog file without any code modifications.
Vulnerability Existed: no
No code changes to analyze - only version updates in changelog [ee/apps/omnichannel-transcript/CHANGELOG.md] [Lines 1-19]
# @rocket.chat/omnichannel-transcript
# @rocket.chat/omnichannel-transcript
+
+## 0.4.26
+
+### Patch Changes
+
+- <details><summary>Updated dependencies []:</summary>
+
+ - @rocket.chat/[email protected]
+ - @rocket.chat/[email protected]
+ - @rocket.chat/[email protected]
+ - @rocket.chat/[email protected]
+ - @rocket.chat/[email protected]
+ - @rocket.chat/[email protected]
+ - @rocket.chat/[email protected]
+ </details>
+
+## 0.4.25
The diff only shows updates to dependency versions in a changelog file, which doesn't contain actual code changes that could introduce or fix security vulnerabilities.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/ee/apps/omnichannel-transcript/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/ee/apps/omnichannel-transcript/package.json@@ -1,7 +1,7 @@ { "name": "@rocket.chat/omnichannel-transcript", "private": true,- "version": "0.4.25",+ "version": "0.4.26", "description": "Rocket.Chat service", "scripts": { "build": "tsc -p tsconfig.json",
Vulnerability Existed: not sure [No specific vulnerability name identified] ee/apps/omnichannel-transcript/package.json [Lines 4] [Old Code] "version": "0.4.25" [Fixed Code] "version": "0.4.26"
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/ee/apps/presence-service/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/ee/apps/presence-service/CHANGELOG.md@@ -1,4 +1,18 @@ # @rocket.chat/presence-service++## 0.4.26++### Patch Changes++- <details><summary>Updated dependencies []:</summary>++ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ </details> ## 0.4.25
Based on the provided diff, I cannot identify any specific security vulnerabilities as it only shows version updates in a changelog file without any code changes.
Vulnerability Existed: no
No vulnerability found ee/apps/presence-service/CHANGELOG.md Lines 1-18
# @rocket.chat/presence-service
# @rocket.chat/presence-service
+
+## 0.4.26
+
+### Patch Changes
+
+- <details><summary>Updated dependencies []:</summary>
+
+ - @rocket.chat/[email protected]
+ - @rocket.chat/[email protected]
+ - @rocket.chat/[email protected]
+ - @rocket.chat/[email protected]
+ - @rocket.chat/[email protected]
+ - @rocket.chat/[email protected]
+ </details>
+
## 0.4.25
The diff only contains dependency version updates in a changelog file, which doesn't reveal any specific security fixes or vulnerabilities. To properly analyze security vulnerabilities, I would need to see the actual code changes in source files rather than just changelog updates.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/ee/apps/presence-service/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/ee/apps/presence-service/package.json@@ -1,7 +1,7 @@ { "name": "@rocket.chat/presence-service", "private": true,- "version": "0.4.25",+ "version": "0.4.26", "description": "Rocket.Chat Presence service", "scripts": { "build": "tsc -p tsconfig.json",
Vulnerability Existed: not sure [No specific vulnerability name identified] ee/apps/presence-service/package.json [3] [Old Code] "version": "0.4.25", [Fixed Code] "version": "0.4.26",
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/ee/apps/queue-worker/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/ee/apps/queue-worker/CHANGELOG.md@@ -1,4 +1,18 @@ # @rocket.chat/queue-worker++## 0.4.26++### Patch Changes++- <details><summary>Updated dependencies []:</summary>++ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ </details> ## 0.4.25
Based on the provided diff, I cannot identify any specific security vulnerabilities as it only shows a changelog update with dependency version bumps.
Vulnerability Existed: no
No vulnerability identified in ee/apps/queue-worker/CHANGELOG.md
Old Code: No previous dependency versions listed
Fixed Code: Updated dependency versions ([email protected], [email protected], [email protected], [email protected], [email protected], [email protected])
Note: This changelog update appears to be documenting dependency updates that may include security fixes, but without seeing the actual code changes in those dependencies or the package.json changes, I cannot determine if specific vulnerabilities were addressed.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/ee/apps/queue-worker/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/ee/apps/queue-worker/package.json@@ -1,7 +1,7 @@ { "name": "@rocket.chat/queue-worker", "private": true,- "version": "0.4.25",+ "version": "0.4.26", "description": "Rocket.Chat service", "scripts": { "build": "tsc -p tsconfig.json",
Vulnerability Existed: not sure No specific vulnerability identified in this diff ee/apps/queue-worker/package.json 1 Old Code: "version": "0.4.25", Fixed Code: "version": "0.4.26",
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/ee/apps/stream-hub-service/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/ee/apps/stream-hub-service/CHANGELOG.md@@ -1,4 +1,17 @@ # @rocket.chat/stream-hub-service++## 0.4.26++### Patch Changes++- <details><summary>Updated dependencies []:</summary>++ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ </details> ## 0.4.25
Based on the provided diff, I cannot identify any specific security vulnerabilities as the changes are limited to dependency updates in a changelog file.
Vulnerability Existed: no
No vulnerability identified ee/apps/stream-hub-service/CHANGELOG.md 1-17
# @rocket.chat/stream-hub-service
# @rocket.chat/stream-hub-service
+
+## 0.4.26
+
+### Patch Changes
+
+- <details><summary>Updated dependencies []:</summary>
+
+ - @rocket.chat/[email protected]
+ - @rocket.chat/[email protected]
+ - @rocket.chat/[email protected]
+ - @rocket.chat/[email protected]
+ - @rocket.chat/[email protected]
+ </details>
+
## 0.4.25
Note: This analysis only covers the specific changelog diff provided. The dependency updates mentioned might include security fixes, but without seeing the actual code changes in those dependencies or the package.json files, I cannot determine if any specific vulnerabilities were addressed.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/ee/apps/stream-hub-service/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/ee/apps/stream-hub-service/package.json@@ -1,7 +1,7 @@ { "name": "@rocket.chat/stream-hub-service", "private": true,- "version": "0.4.25",+ "version": "0.4.26", "description": "Rocket.Chat Stream Hub service", "scripts": { "build": "tsc -p tsconfig.json",
Vulnerability Existed: not sure No specific vulnerability identified in this diff File: ee/apps/stream-hub-service/package.json Lines: Version number change only Old Code: "version": "0.4.25" Fixed Code: "version": "0.4.26"
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/ee/packages/license/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/ee/packages/license/CHANGELOG.md@@ -1,4 +1,13 @@ # @rocket.chat/license++## 1.0.17++### Patch Changes++- <details><summary>Updated dependencies []:</summary>++ - @rocket.chat/[email protected]+ </details> ## 1.0.16
Based on the provided diff, I cannot identify any security vulnerabilities as the changes are only to documentation (CHANGELOG.md) showing dependency updates.
Vulnerability Existed: no
No vulnerability found ee/packages/license/CHANGELOG.md 1-4
# @rocket.chat/license
## 1.0.17
### Patch Changes
- <details><summary>Updated dependencies []:</summary>
- @rocket.chat/[email protected]
</details>
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/ee/packages/license/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/ee/packages/license/package.json@@ -1,6 +1,6 @@ { "name": "@rocket.chat/license",- "version": "1.0.16",+ "version": "1.0.17", "private": true, "devDependencies": { "@rocket.chat/jest-presets": "workspace:~",
Vulnerability Existed: not sure No specific vulnerability identified ee/packages/license/package.json 2 Old Code: "version": "1.0.16", Fixed Code: "version": "1.0.17", Note: The diff only shows a version bump in a package.json file without any code changes. This could be related to security fixes in dependencies or internal improvements, but without more context about what changed between versions 1.0.16 and 1.0.17 of the license package, no specific vulnerability can be identified from this limited information.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/ee/packages/network-broker/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/ee/packages/network-broker/CHANGELOG.md@@ -1,4 +1,13 @@ # @rocket.chat/network-broker++## 0.2.5++### Patch Changes++- <details><summary>Updated dependencies []:</summary>++ - @rocket.chat/[email protected]+ </details> ## 0.2.4
Based on the provided diff, I cannot identify any security vulnerabilities as this is a changelog file update showing version changes and dependency updates.
Vulnerability Existed: no
No vulnerability found in ee/packages/network-broker/CHANGELOG.md [Lines 1-13]
Old Code: # @rocket.chat/network-broker
Fixed Code: # @rocket.chat/network-broker
+
+## 0.2.5
+
+### Patch Changes
+
+- <details><summary>Updated dependencies []:</summary>
+
+ - @rocket.chat/[email protected]
+ </details>
This diff only shows documentation updates to a changelog file, which typically doesn't contain code changes that could introduce or fix security vulnerabilities. The update appears to be adding a new version entry (0.2.5) with dependency updates.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/ee/packages/network-broker/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/ee/packages/network-broker/package.json@@ -1,6 +1,6 @@ { "name": "@rocket.chat/network-broker",- "version": "0.2.4",+ "version": "0.2.5", "private": true, "devDependencies": { "@rocket.chat/eslint-config": "workspace:^",
Vulnerability Existed: not sure No specific vulnerability identified in the provided diff File: ee/packages/network-broker/package.json Lines: Version number change only Old Code: "version": "0.2.4" Fixed Code: "version": "0.2.5" Note: The diff only shows a version number update from 0.2.4 to 0.2.5. Without additional context about what changed between these versions, it's impossible to determine if any security vulnerabilities were fixed. Version bumps often include security patches, but they can also include feature additions, bug fixes, or other improvements.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/ee/packages/omnichannel-services/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/ee/packages/omnichannel-services/CHANGELOG.md@@ -1,4 +1,18 @@ # @rocket.chat/omnichannel-services++## 0.3.23++### Patch Changes++- <details><summary>Updated dependencies [8874a5aab72c962f213d128a54393d95f7dabef8]:</summary>++ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ </details> ## 0.3.22
Looking at the provided diff, I can see that it only shows changes to a CHANGELOG.md file, which is documentation rather than actual code. The diff shows version updates and dependency changes, but no actual code modifications that would indicate security fixes. Based on the limited information in this specific diff: ``` Vulnerability Existed: not sure No code changes detected [ee/packages/omnichannel-services/CHANGELOG.md] [1-18] [Old Code] # @rocket.chat/omnichannel-services [Fixed Code] # @rocket.chat/omnichannel-services ## 0.3.23 ### Patch Changes - <details><summary>Updated dependencies [8874a5aab72c962f213d128a54393d95f7dabef8]:</summary> - @rocket.chat/[email protected] - @rocket.chat/[email protected] - @rocket.chat/[email protected] - @rocket.chat/[email protected] - @rocket.chat/[email protected] - @rocket.chat/[email protected] </details> ## 0.3.22 ``` Note: This analysis is limited to the provided diff content. The dependency updates might indicate underlying security fixes in the updated packages, but without seeing the actual code changes in those dependencies or in the main codebase, I cannot identify specific vulnerabilities from this changelog update alone.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/ee/packages/omnichannel-services/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/ee/packages/omnichannel-services/package.json@@ -1,6 +1,6 @@ { "name": "@rocket.chat/omnichannel-services",- "version": "0.3.22",+ "version": "0.3.23", "private": true, "devDependencies": { "@rocket.chat/eslint-config": "workspace:^",
Vulnerability Existed: not sure [No specific vulnerability identified] ee/packages/omnichannel-services/package.json [1] [Old Code] "version": "0.3.22", [Fixed Code] "version": "0.3.23",
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/ee/packages/pdf-worker/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/ee/packages/pdf-worker/CHANGELOG.md@@ -1,4 +1,13 @@ # @rocket.chat/pdf-worker++## 0.3.5++### Patch Changes++- <details><summary>Updated dependencies []:</summary>++ - @rocket.chat/[email protected]+ </details> ## 0.3.4
Based on the provided diff, I cannot identify any security vulnerabilities as the changes are only to a changelog file.
Vulnerability Existed: no
No vulnerability found in ee/packages/pdf-worker/CHANGELOG.md
Old Code: Changelog without version 0.3.5 entry
Fixed Code: Changelog with version 0.3.5 entry and dependency update
The diff shows only documentation changes to a changelog file, adding information about version 0.3.5 and updated dependencies. No actual code changes were made that could introduce or fix security vulnerabilities.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/ee/packages/pdf-worker/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/ee/packages/pdf-worker/package.json@@ -1,6 +1,6 @@ { "name": "@rocket.chat/pdf-worker",- "version": "0.3.4",+ "version": "0.3.5", "private": true, "main": "./dist/index.js", "typings": "./dist/index.d.ts",
Vulnerability Existed: not sure [No specific vulnerability name - potential dependency update] ee/packages/pdf-worker/package.json 2 [Old Code] "version": "0.3.4", [Fixed Code] "version": "0.3.5",
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/ee/packages/presence/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/ee/packages/presence/CHANGELOG.md@@ -1,4 +1,15 @@ # @rocket.chat/presence++## 0.2.26++### Patch Changes++- <details><summary>Updated dependencies []:</summary>++ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ </details> ## 0.2.25
Based on the provided diff, I cannot identify any security vulnerabilities as the changes are only to a changelog file documenting dependency updates. Vulnerability Existed: no No security vulnerability found in changelog update [ee/packages/presence/CHANGELOG.md] [Lines 1-15] [Old Code] # @rocket.chat/presence [Fixed Code] # @rocket.chat/presence + +## 0.2.26 + +### Patch Changes + +- <details><summary>Updated dependencies []:</summary> + + - @rocket.chat/[email protected] + - @rocket.chat/[email protected] + - @rocket.chat/[email protected] + </details> Note: The changelog update shows dependency version bumps, but without the actual code changes in those dependencies or the package implementation, I cannot determine if any security vulnerabilities were addressed in this specific update.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/ee/packages/presence/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/ee/packages/presence/package.json@@ -1,6 +1,6 @@ { "name": "@rocket.chat/presence",- "version": "0.2.25",+ "version": "0.2.26", "private": true, "devDependencies": { "@babel/core": "~7.26.0",
Vulnerability Existed: not sure [No specific vulnerability name identified] ee/packages/presence/package.json [1] [Old Code] "version": "0.2.25", [Fixed Code] "version": "0.2.26",
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/package.json@@ -1,6 +1,6 @@ { "name": "rocket.chat",- "version": "7.7.1",+ "version": "7.7.2", "description": "Rocket.Chat Monorepo", "main": "index.js", "private": true,
Vulnerability Existed: not sure No specific vulnerability identified package.json Lines 2-2 - "version": "7.7.1", + "version": "7.7.2",
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/api-client/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/api-client/CHANGELOG.md@@ -1,4 +1,14 @@ # @rocket.chat/api-client++## 0.2.26++### Patch Changes++- <details><summary>Updated dependencies [8874a5aab72c962f213d128a54393d95f7dabef8]:</summary>++ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ </details> ## 0.2.25
Looking at the provided diff, I can see it's only a changelog file update showing version changes and dependency updates. There are no actual code changes in this diff that would indicate security fixes. Vulnerability Existed: no No code changes in CHANGELOG.md [No old code] [No fixed code] The diff only shows: - Version bump from 0.2.25 to 0.2.26 - Dependency updates for @rocket.chat/rest-typings and @rocket.chat/core-typings to version 7.7.2 - No actual source code modifications that could indicate security vulnerability fixes Since this is just a changelog update without any accompanying code changes in the diff, I cannot identify any specific security vulnerabilities that were fixed.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/api-client/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/api-client/package.json@@ -1,6 +1,6 @@ { "name": "@rocket.chat/api-client",- "version": "0.2.25",+ "version": "0.2.26", "devDependencies": { "@rocket.chat/jest-presets": "workspace:~", "@types/jest": "~29.5.14",
Vulnerability Existed: not sure No specific vulnerability identified packages/api-client/package.json 1 [Old Code] "version": "0.2.25", [Fixed Code] "version": "0.2.26",
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/apps/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/apps/CHANGELOG.md@@ -1,4 +1,14 @@ # @rocket.chat/apps++## 0.5.5++### Patch Changes++- <details><summary>Updated dependencies []:</summary>++ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ </details> ## 0.5.4
Based on the provided diff, I cannot identify any security vulnerabilities as the changes only show version updates in a changelog file.
Vulnerability Existed: no
No vulnerability CHANGELOG.md All lines
No old code with vulnerability
No fixed code
The diff only shows:
- Addition of version 0.5.5 in the changelog
- Updated dependencies (@rocket.chat/[email protected] and @rocket.chat/[email protected])
- No actual code changes that could introduce or fix security vulnerabilities
Changelog files typically document changes but don't contain executable code that could have security implications.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/apps/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/apps/package.json@@ -1,6 +1,6 @@ { "name": "@rocket.chat/apps",- "version": "0.5.4",+ "version": "0.5.5", "private": true, "devDependencies": { "eslint": "~8.45.0",
Vulnerability Existed: not sure No specific vulnerability name packages/apps/package.json 1 - "version": "0.5.4", + "version": "0.5.5",
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/core-services/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/core-services/CHANGELOG.md@@ -1,4 +1,15 @@ # @rocket.chat/core-services++## 0.9.5++### Patch Changes++- <details><summary>Updated dependencies [8874a5aab72c962f213d128a54393d95f7dabef8]:</summary>++ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ </details> ## 0.9.4
Based on the provided diff, I cannot identify any security vulnerabilities as the changes are only to a changelog file documenting dependency updates.
Vulnerability Existed: no
No vulnerability found packages/core-services/CHANGELOG.md Lines 1-15
# @rocket.chat/core-services
# @rocket.chat/core-services
+
+## 0.9.5
+
+### Patch Changes
+
+- <details><summary>Updated dependencies [8874a5aab72c962f213d128a54393d95f7dabef8]:</summary>
+
+ - @rocket.chat/[email protected]
+ - @rocket.chat/[email protected]
+ - @rocket.chat/[email protected]
+ </details>
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/core-services/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/core-services/package.json@@ -1,6 +1,6 @@ { "name": "@rocket.chat/core-services",- "version": "0.9.4",+ "version": "0.9.5", "private": true, "devDependencies": { "@babel/core": "~7.26.0",
Vulnerability Existed: not sure No specific vulnerability identified packages/core-services/package.json Lines 1-1 Old Code: `"version": "0.9.4",` Fixed Code: `"version": "0.9.5",`
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/core-typings/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/core-typings/CHANGELOG.md@@ -1,4 +1,6 @@ # @rocket.chat/core-typings++## 7.7.2 ## 7.7.1
Based on the provided diff, I cannot identify any security vulnerabilities as the changes are only to a changelog file.
Vulnerability Existed: no
No vulnerability CHANGELOG.md 1-4
# @rocket.chat/core-typings
# @rocket.chat/core-typings
+
+## 7.7.2
## 7.7.1
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/core-typings/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/core-typings/package.json@@ -2,7 +2,7 @@ "$schema": "https://json.schemastore.org/package", "name": "@rocket.chat/core-typings", "private": true,- "version": "7.7.1",+ "version": "7.7.2", "devDependencies": { "@rocket.chat/apps-engine": "workspace:^", "@rocket.chat/eslint-config": "workspace:^",
Vulnerability Existed: no
No vulnerability found in this diff. The change is a version update.
File: packages/core-typings/package.json
Lines: Version number line
Old Code: "version": "7.7.1"
Fixed Code: "version": "7.7.2"
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/cron/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/cron/CHANGELOG.md@@ -1,4 +1,14 @@ # @rocket.chat/cron++## 0.1.26++### Patch Changes++- <details><summary>Updated dependencies []:</summary>++ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ </details> ## 0.1.25
Looking at the provided diff, I can see it's only a changelog file update showing version changes and dependency updates. There is no actual code change shown in this diff. Vulnerability Existed: no No code changes detected [packages/cron/CHANGELOG.md] [Lines 1-14] [Old Code] # @rocket.chat/cron ## 0.1.25 [Fixed Code] # @rocket.chat/cron ## 0.1.26 ### Patch Changes - <details><summary>Updated dependencies []:</summary> - @rocket.chat/[email protected] - @rocket.chat/[email protected] </details> ## 0.1.25 The diff only shows documentation updates (CHANGELOG.md) with version bumps and dependency updates, but no actual source code changes that would indicate security fixes.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/cron/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/cron/package.json@@ -1,6 +1,6 @@ { "name": "@rocket.chat/cron",- "version": "0.1.25",+ "version": "0.1.26", "private": true, "devDependencies": { "eslint": "~8.45.0",
Based on the provided code diff, I cannot identify any security vulnerabilities as the change is limited to a version number update.
Vulnerability Existed: no
No vulnerability identified packages/cron/package.json 2
"version": "0.1.25"
"version": "0.1.26"
The diff shows only a version bump from 0.1.25 to 0.1.26 in the package.json file. There are no changes to dependencies, scripts, or other fields that could indicate a security fix. Version updates alone without accompanying code changes do not provide enough context to identify specific vulnerabilities.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/ddp-client/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/ddp-client/CHANGELOG.md@@ -1,4 +1,15 @@ # @rocket.chat/ddp-client++## 0.3.26++### Patch Changes++- <details><summary>Updated dependencies [8874a5aab72c962f213d128a54393d95f7dabef8]:</summary>++ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ </details> ## 0.3.25
Looking at the provided diff, I can see that it only shows changes to a CHANGELOG.md file, which is documentation/metadata. There is no actual code change shown in this diff - only version updates and dependency information.
Since this diff doesn't contain any code modifications (only changelog updates), I cannot identify any security vulnerabilities from the provided content.
Vulnerability Existed: no
No code changes in provided diff
No old code to show
No fixed code to show
The diff only shows:
- Addition of version 0.3.26 in the changelog
- Updated dependency versions
- No actual source code modifications that could indicate security fixes
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/ddp-client/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/ddp-client/package.json@@ -1,6 +1,6 @@ { "name": "@rocket.chat/ddp-client",- "version": "0.3.25",+ "version": "0.3.26", "devDependencies": { "@rocket.chat/jest-presets": "workspace:~", "@types/jest": "~29.5.14",
Vulnerability Existed: not sure [No specific vulnerability name identified] packages/ddp-client/package.json [Lines 1-1] [Old Code] "version": "0.3.25", [Fixed Code] "version": "0.3.26", Note: This diff only shows a version number increment in a package.json file. Without additional context about what changed between versions 0.3.25 and 0.3.26 of the ddp-client package, it's impossible to determine if this change includes security fixes. Version bumps can include security patches, but they can also include feature additions, bug fixes, or other improvements.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/freeswitch/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/freeswitch/CHANGELOG.md@@ -1,4 +1,13 @@ # @rocket.chat/freeswitch++## 1.2.13++### Patch Changes++- <details><summary>Updated dependencies []:</summary>++ - @rocket.chat/[email protected]+ </details> ## 1.2.12
Based on the provided diff, I cannot identify any security vulnerabilities as this appears to be a changelog update rather than code changes. ``` Vulnerability Existed: no No vulnerability found packages/freeswitch/CHANGELOG.md Lines 1-13 [Old Code] # @rocket.chat/freeswitch [Fixed Code] # @rocket.chat/freeswitch ## 1.2.13 ### Patch Changes - <details><summary>Updated dependencies []:</summary> - @rocket.chat/[email protected] </details> ``` The diff shows only documentation updates to the CHANGELOG.md file, adding version information and dependency updates. No actual code changes are present that would indicate security fixes.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/freeswitch/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/freeswitch/package.json@@ -1,6 +1,6 @@ { "name": "@rocket.chat/freeswitch",- "version": "1.2.12",+ "version": "1.2.13", "private": true, "devDependencies": { "@rocket.chat/jest-presets": "workspace:~",
Vulnerability Existed: not sure [No specific vulnerability name identified] packages/freeswitch/package.json [Lines: Version number change] [Old Code] "version": "1.2.12", [Fixed Code] "version": "1.2.13",
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/fuselage-ui-kit/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/fuselage-ui-kit/CHANGELOG.md@@ -1,4 +1,17 @@ # Change Log++## 19.0.2++### Patch Changes++- <details><summary>Updated dependencies []:</summary>++ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ </details> ## 19.0.1
Looking at the provided diff, I can see that it only shows changes to a CHANGELOG.md file, which is documentation/metadata rather than actual code. There are no code changes shown in this diff that would indicate security fixes. Based on the limited information provided: ``` Vulnerability Existed: not sure No code changes detected [packages/fuselage-ui-kit/CHANGELOG.md] [Lines 1-17] [Old Code] # Change Log [Fixed Code] # Change Log +## 19.0.2 + +### Patch Changes + +- <details><summary>Updated dependencies []:</summary> + + - @rocket.chat/[email protected] + - @rocket.chat/[email protected] + - @rocket.chat/[email protected] + - @rocket.chat/[email protected] + - @rocket.chat/[email protected] + </details> ``` The diff only shows version updates in a changelog file without any actual code modifications. Without seeing the actual code changes in the updated dependencies or other files, I cannot identify any specific security vulnerabilities that were fixed.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/fuselage-ui-kit/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/fuselage-ui-kit/package.json@@ -1,6 +1,6 @@ { "name": "@rocket.chat/fuselage-ui-kit",- "version": "19.0.1",+ "version": "19.0.2", "private": true, "description": "UiKit elements for Rocket.Chat Apps built under Fuselage design system", "homepage": "https://rocketchat.github.io/Rocket.Chat.Fuselage/",
Vulnerability Existed: not sure [No specific vulnerability name] packages/fuselage-ui-kit/package.json [2] [Old Code] ```json "version": "19.0.1", ``` [Fixed Code] ```json "version": "19.0.2", ``` Note: The diff only shows a version bump in a package.json file. Without additional context about what changed between versions 19.0.1 and 19.0.2, it's impossible to determine if this update contains security fixes. Version bumps alone don't necessarily indicate security patches.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/gazzodown/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/gazzodown/CHANGELOG.md@@ -1,4 +1,15 @@ # @rocket.chat/gazzodown++## 19.0.2++### Patch Changes++- <details><summary>Updated dependencies []:</summary>++ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ </details> ## 19.0.1
Looking at the provided diff, I can see that this is a changelog file update showing version changes and dependency updates. However, I need to analyze this specific diff for security fixes. Based on the diff content: 1. This is only a changelog file (CHANGELOG.md) showing version updates 2. The diff shows the addition of version 19.0.2 with dependency updates 3. No actual code changes are shown in this diff 4. The dependencies being updated are: - @rocket.chat/[email protected] - @rocket.chat/[email protected] - @rocket.chat/[email protected] Since this is only a changelog update and doesn't show any actual code changes, I cannot identify specific security vulnerabilities from this diff alone. Changelogs typically document what changed but don't show the actual code fixes. Vulnerability Existed: not sure No code changes shown in provided diff packages/gazzodown/CHANGELOG.md 1-15 [No old code shown - only changelog additions] [No fixed code shown - only version documentation] Note: The dependency updates might indicate security fixes in the updated packages, but without seeing the actual code changes in those dependencies or in the gazzodown package itself, I cannot determine what specific vulnerabilities were addressed.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/gazzodown/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/gazzodown/package.json@@ -1,6 +1,6 @@ { "name": "@rocket.chat/gazzodown",- "version": "19.0.1",+ "version": "19.0.2", "private": true, "main": "./dist/index.js", "typings": "./dist/index.d.ts",
Vulnerability Existed: not sure No specific vulnerability identified packages/gazzodown/package.json 1 - "version": "19.0.1", + "version": "19.0.2", Note: This diff only shows a version bump in a package.json file. Without additional context about what changed between versions 19.0.1 and 19.0.2, I cannot identify any specific security vulnerability that was fixed. Version bumps often include security patches, but the diff provided doesn't show any code changes that would indicate what vulnerability was addressed.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/instance-status/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/instance-status/CHANGELOG.md@@ -1,4 +1,13 @@ # @rocket.chat/instance-status++## 0.1.26++### Patch Changes++- <details><summary>Updated dependencies []:</summary>++ - @rocket.chat/[email protected]+ </details> ## 0.1.25
Based on the provided code diff, I cannot identify any security vulnerabilities. The changes shown are only to a changelog file (CHANGELOG.md) which documents dependency updates and version changes, but does not contain any actual code changes that could introduce or fix security vulnerabilities.
Vulnerability Existed: no
No vulnerability found packages/instance-status/CHANGELOG.md Lines 1-13
Old Code: # @rocket.chat/instance-status
Fixed Code: # @rocket.chat/instance-status
+
+## 0.1.26
+
+### Patch Changes
+
+- <details><summary>Updated dependencies []:</summary>
+
+ - @rocket.chat/[email protected]
+ </details>
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/instance-status/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/instance-status/package.json@@ -1,6 +1,6 @@ { "name": "@rocket.chat/instance-status",- "version": "0.1.25",+ "version": "0.1.26", "private": true, "devDependencies": { "@rocket.chat/eslint-config": "workspace:^",
Vulnerability Existed: not sure No specific vulnerability identified packages/instance-status/package.json 2 [Old Code] "version": "0.1.25", [Fixed Code] "version": "0.1.26", Note: The diff only shows a version bump from 0.1.25 to 0.1.26 in a package.json file. Without additional context about what changed between these versions, it's impossible to determine if this update addresses any specific security vulnerability. Version bumps can include security fixes, but they can also include feature additions, bug fixes, or other changes.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/livechat/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/livechat/CHANGELOG.md@@ -1,4 +1,13 @@ # @rocket.chat/livechat Change Log++## 1.22.13++### Patch Changes++- <details><summary>Updated dependencies []:</summary>++ - @rocket.chat/[email protected]+ </details> ## 1.22.12
Based on the provided diff, I cannot identify any security vulnerabilities as this is a changelog file update showing dependency changes. Vulnerability Existed: no No security vulnerability found in packages/livechat/CHANGELOG.md [Old Code] # @rocket.chat/livechat Change Log [Fixed Code] # @rocket.chat/livechat Change Log + +## 1.22.13 + +### Patch Changes + +- <details><summary>Updated dependencies []:</summary> + + - @rocket.chat/[email protected] + </details> ## 1.22.12 The diff only shows a version update and dependency changes in a changelog file, which doesn't contain executable code that could introduce security vulnerabilities.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/livechat/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/livechat/package.json@@ -1,6 +1,6 @@ { "name": "@rocket.chat/livechat",- "version": "1.22.12",+ "version": "1.22.13", "files": [ "/build" ],
Vulnerability Existed: not sure No specific vulnerability name packages/livechat/package.json 2 - "version": "1.22.12" + "version": "1.22.13"
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/livechat/src/components/App/App.tsx+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/livechat/src/components/App/App.tsx@@ -140,11 +140,14 @@ iframe: { visible }, config: { theme }, dispatch,+ undocked, } = this.props;- parentCall(minimized ? 'minimizeWindow' : 'restoreWindow');- parentCall(visible ? 'showWidget' : 'hideWidget');- parentCall('setWidgetPosition', theme.position || 'right');+ if (!undocked) {+ parentCall(minimized ? 'minimizeWindow' : 'restoreWindow');+ parentCall(visible ? 'showWidget' : 'hideWidget');+ parentCall('setWidgetPosition', theme.position || 'right');+ } visibility.addListener(this.handleVisibilityChange);
Vulnerability Existed: yes
Cross-Site Scripting (XSS) [packages/livechat/src/components/App/App.tsx] [Lines 140-150]
[Old Code]
```javascript
parentCall(minimized ? 'minimizeWindow' : 'restoreWindow');
parentCall(visible ? 'showWidget' : 'hideWidget');
parentCall('setWidgetPosition', theme.position || 'right');
```
[Fixed Code]
```javascript
if (!undocked) {
parentCall(minimized ? 'minimizeWindow' : 'restoreWindow');
parentCall(visible ? 'showWidget' : 'hideWidget');
parentCall('setWidgetPosition', theme.position || 'right');
}
```
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/livechat/src/components/Screen/ScreenProvider.tsx+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/livechat/src/components/Screen/ScreenProvider.tsx@@ -1,10 +1,9 @@ import type { FunctionalComponent } from 'preact'; import { createContext } from 'preact';-import { useCallback, useContext, useEffect, useState } from 'preact/hooks';+import { useContext, useEffect, useState } from 'preact/hooks'; import { parse } from 'query-string'; import { isActiveSession } from '../../helpers/isActiveSession';-import { createOrUpdateGuest, evaluateChangesAndLoadConfigByFields } from '../../lib/hooks'; import { loadConfig } from '../../lib/main'; import { parentCall } from '../../lib/parentCall'; import { loadMessages } from '../../lib/room';@@ -63,21 +62,11 @@ } as ScreenContextValue); export const ScreenProvider: FunctionalComponent = ({ children }) => {- const {- dispatch,- config,- sound,- minimized = true,- undocked,- expanded = false,- alerts,- modal,- iframe,- ...store- } = useContext(StoreContext);+ const store = useContext(StoreContext);+ const { token, dispatch, config, sound, minimized = true, undocked, expanded = false, alerts, modal, iframe, customFieldsQueue } = store; const { department, name, email } = iframe.guest || {}; const { color, position: configPosition, background } = config.theme || {};- const { livechatLogo, hideWatermark = false, registrationForm } = config.settings || {};+ const { livechatLogo, hideWatermark = false } = config.settings || {}; const { color: customColor,@@ -128,7 +117,7 @@ }; const handleOpenWindow = () => {- parentCall('openPopout', store.token);+ parentCall('openPopout', { token, iframe, customFieldsQueue }); dispatch({ undocked: true, minimized: false }); };@@ -138,30 +127,14 @@ const dismissNotification = () => !isActiveSession();- const checkPoppedOutWindow = useCallback(async () => {+ useEffect(() => { // Checking if the window is poppedOut and setting parent minimized if yes for the restore purpose const poppedOut = parse(window.location.search).mode === 'popout';- const { token = '' } = parse(window.location.search); setPopedOut(poppedOut);- if (poppedOut) { dispatch({ minimized: false, undocked: true }); }-- if (token && typeof token === 'string') {- if (registrationForm && !name && !email) {- dispatch({ token });- return;- }- await evaluateChangesAndLoadConfigByFields(async () => {- await createOrUpdateGuest({ token });- });- }- }, [dispatch, email, name, registrationForm]);-- useEffect(() => {- checkPoppedOutWindow();- }, [checkPoppedOutWindow]);+ }, [dispatch]); const screenProps = { theme: {
Vulnerability Existed: yes
Information Exposure Through an Unprotected Popout Window [packages/livechat/src/components/Screen/ScreenProvider.tsx] [127-140]
[Old Code]
```typescript
const handleOpenWindow = () => {
parentCall('openPopout', store.token);
dispatch({ undocked: true, minimized: false });
};
```
[Fixed Code]
```typescript
const handleOpenWindow = () => {
parentCall('openPopout', { token, iframe, customFieldsQueue });
dispatch({ undocked: true, minimized: false });
};
```
Vulnerability Existed: yes
Insufficient Session Validation in Popout Windows [packages/livechat/src/components/Screen/ScreenProvider.tsx] [138-163]
[Old Code]
```typescript
const checkPoppedOutWindow = useCallback(async () => {
// Checking if the window is poppedOut and setting parent minimized if yes for the restore purpose
const poppedOut = parse(window.location.search).mode === 'popout';
const { token = '' } = parse(window.location.search);
setPopedOut(poppedOut);
if (poppedOut) {
dispatch({ minimized: false, undocked: true });
}
if (token && typeof token === 'string') {
if (registrationForm && !name && !email) {
dispatch({ token });
return;
}
await evaluateChangesAndLoadConfigByFields(async () => {
await createOrUpdateGuest({ token });
});
}
}, [dispatch, email, name, registrationForm]);
useEffect(() => {
checkPoppedOutWindow();
}, [checkPoppedOutWindow]);
```
[Fixed Code]
```typescript
useEffect(() => {
// Checking if the window is poppedOut and setting parent minimized if yes for the restore purpose
const poppedOut = parse(window.location.search).mode === 'popout';
setPopedOut(poppedOut);
if (poppedOut) {
dispatch({ minimized: false, undocked: true });
}
}, [dispatch]);
```
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/livechat/src/lib/customFields.js+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/livechat/src/lib/customFields.js@@ -28,7 +28,6 @@ reset() { this._initiated = false; this._started = false;- this._queue = {}; store.off('change', this.handleStoreChange); }@@ -48,18 +47,36 @@ CustomFields.instance.processCustomFields(); }+ addToQueue(key, value, overwrite) {+ const { customFieldsQueue } = store.state;+ store.setState({+ customFieldsQueue: {+ ...customFieldsQueue,+ [key]: { value, overwrite },+ },+ });+ }++ getQueue() {+ return store.state.customFieldsQueue;+ }++ clearQueue() {+ store.setState({ customFieldsQueue: {} });+ }+ processCustomFields() {- Object.keys(this._queue).forEach((key) => {- const { value, overwrite } = this._queue[key];+ const queue = this.getQueue();+ Object.entries(queue).forEach(([key, { value, overwrite }]) => { this.setCustomField(key, value, overwrite); });- this._queue = {};+ this.clearQueue(); } setCustomField(key, value, overwrite = true) { if (!this._started) {- this._queue[key] = { value, overwrite };+ this.addToQueue(key, value, overwrite); return; }
Vulnerability Existed: not sure
Potential Race Condition or State Inconsistency packages/livechat/src/lib/customFields.js Lines 28-48
[Old Code]
```javascript
reset() {
this._initiated = false;
this._started = false;
this._queue = {};
store.off('change', this.handleStoreChange);
}
```
[Fixed Code]
```javascript
reset() {
this._initiated = false;
this._started = false;
store.off('change', this.handleStoreChange);
}
```
Vulnerability Existed: not sure
Potential State Management Vulnerability packages/livechat/src/lib/customFields.js Lines 48-75
[Old Code]
```javascript
processCustomFields() {
Object.keys(this._queue).forEach((key) => {
const { value, overwrite } = this._queue[key];
this.setCustomField(key, value, overwrite);
});
this._queue = {};
}
```
[Fixed Code]
```javascript
addToQueue(key, value, overwrite) {
const { customFieldsQueue } = store.state;
store.setState({
customFieldsQueue: {
...customFieldsQueue,
[key]: { value, overwrite },
},
});
}
getQueue() {
return store.state.customFieldsQueue;
}
clearQueue() {
store.setState({ customFieldsQueue: {} });
}
processCustomFields() {
const queue = this.getQueue();
Object.entries(queue).forEach(([key, { value, overwrite }]) => {
this.setCustomField(key, value, overwrite);
});
this.clearQueue();
}
```
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/livechat/src/lib/hooks.ts+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/livechat/src/lib/hooks.ts@@ -109,6 +109,22 @@ }; const api = {+ syncState(data: Partial<StoreState>) {+ if (!data || typeof data !== 'object') {+ return;+ }++ void evaluateChangesAndLoadConfigByFields(async () => {+ const { user } = store.state;++ if (user && data.token && user.token !== data.token) {+ await createOrUpdateGuest({ token: data.token });+ }++ store.setState(data);+ });+ },+ pageVisited(info: { change: string; title: string; location: { href: string } }) { const { token, room } = store.state; const { _id: rid } = room || {};
Vulnerability Existed: yes
Cross-Site Request Forgery (CSRF) [packages/livechat/src/lib/hooks.ts] [Lines 109-122]
[Old Code]
```typescript
// No equivalent function existed in old code
```
[Fixed Code]
```typescript
syncState(data: Partial<StoreState>) {
if (!data || typeof data !== 'object') {
return;
}
void evaluateChangesAndLoadConfigByFields(async () => {
const { user } = store.state;
if (user && data.token && user.token !== data.token) {
await createOrUpdateGuest({ token: data.token });
}
store.setState(data);
});
},
```
Vulnerability Existed: yes
Authentication Bypass [packages/livechat/src/lib/hooks.ts] [Lines 109-122]
[Old Code]
```typescript
// No equivalent function existed in old code
```
[Fixed Code]
```typescript
syncState(data: Partial<StoreState>) {
if (!data || typeof data !== 'object') {
return;
}
void evaluateChangesAndLoadConfigByFields(async () => {
const { user } = store.state;
if (user && data.token && user.token !== data.token) {
await createOrUpdateGuest({ token: data.token });
}
store.setState(data);
});
},
```
Note: The vulnerability appears to be related to improper state synchronization that could allow an attacker to manipulate the user's session token or state. The fix adds validation and controlled state updates with proper token verification before making changes.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/livechat/src/lib/parentCall.ts+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/livechat/src/lib/parentCall.ts@@ -1,4 +1,12 @@ import { VALID_CALLBACKS } from '../widget';++const getParentWindowTarget = () => {+ if (window.opener && !window.opener.closed) {+ return window.opener;+ }++ return window.parent;+}; export const parentCall = (method: string, ...args: any[]) => { const data = {@@ -7,8 +15,9 @@ args, };+ const target = getParentWindowTarget(); // TODO: This lgtm ignoring deserves more attention urgently!- window.parent.postMessage(data, '*'); // lgtm [js/cross-window-information-leak]+ target.postMessage(data, '*'); // lgtm [js/cross-window-information-leak] }; export const runCallbackEventEmitter = (callbackName: string, data: unknown) =>
Vulnerability Existed: yes Cross-Window Information Leak packages/livechat/src/lib/parentCall.ts [7-15] [Old Code] ```javascript window.parent.postMessage(data, '*'); // lgtm [js/cross-window-information-leak] ``` [Fixed Code] ```javascript const target = getParentWindowTarget(); // TODO: This lgtm ignoring deserves more attention urgently! target.postMessage(data, '*'); // lgtm [js/cross-window-information-leak] ``` Vulnerability Existed: yes Cross-Site Scripting (XSS) via postMessage Origin Validation packages/livechat/src/lib/parentCall.ts [7-15] [Old Code] ```javascript window.parent.postMessage(data, '*'); // lgtm [js/cross-window-information-leak] ``` [Fixed Code] ```javascript const target = getParentWindowTarget(); // TODO: This lgtm ignoring deserves more attention urgently! target.postMessage(data, '*'); // lgtm [js/cross-window-information-leak] ```
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/livechat/src/store/index.tsx+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/livechat/src/store/index.tsx@@ -3,13 +3,13 @@ import { Component, createContext } from 'preact'; import { useContext } from 'preact/hooks';+import Store from './Store'; import type { CustomField } from '../components/Form/CustomFields'; import type { Agent } from '../definitions/agents'; import type { Department } from '../definitions/departments'; import type { TriggerMessage } from '../definitions/triggerMessage'; import { parentCall } from '../lib/parentCall'; import { createToken } from '../lib/random';-import Store from './Store'; export type LivechatHiddenSytemMessageType = | 'uj' // User joined@@ -123,6 +123,7 @@ connecting?: boolean; messageListPosition?: 'top' | 'bottom' | 'free'; renderedTriggers: TriggerMessage[];+ customFieldsQueue: Record<string, { value: string; overwrite: boolean }>; }; export const initialState = (): StoreState => ({@@ -164,6 +165,7 @@ ongoingCall: null, // TODO: store call info like url, startTime, timeout, etc here businessUnit: null, renderedTriggers: [],+ customFieldsQueue: {}, }); const dontPersist = [@@ -191,6 +193,10 @@ }); window.addEventListener('visibilitychange', () => {+ if (store.state.undocked) {+ return;+ }+ !store.state.minimized && !store.state.triggered && parentCall('openWidget'); store.state.iframe.visible ? parentCall('showWidget') : parentCall('hideWidget'); });
Vulnerability Existed: not sure
Potential XSS via Visibility Change Handler [packages/livechat/src/store/index.tsx] [Lines 192-196]
```typescript
window.addEventListener('visibilitychange', () => {
!store.state.minimized && !store.state.triggered && parentCall('openWidget');
store.state.iframe.visible ? parentCall('showWidget') : parentCall('hideWidget');
});
```
```typescript
window.addEventListener('visibilitychange', () => {
if (store.state.undocked) {
return;
}
!store.state.minimized && !store.state.triggered && parentCall('openWidget');
store.state.iframe.visible ? parentCall('showWidget') : parentCall('hideWidget');
});
```
Vulnerability Existed: not sure
Insecure State Mutation [packages/livechat/src/store/index.tsx] [Lines 123, 165]
```typescript
// Old state definition missing customFieldsQueue
renderedTriggers: TriggerMessage[];
```
```typescript
// New state includes customFieldsQueue
renderedTriggers: TriggerMessage[];
customFieldsQueue: Record<string, { value: string; overwrite: boolean }>;
```
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/livechat/src/widget.ts+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/livechat/src/widget.ts@@ -7,11 +7,10 @@ import type { StoreState } from './store'; type InternalWidgetAPI = {- popup: Window | null; ready: () => void; minimizeWindow: () => void; restoreWindow: () => void;- openPopout: (token?: string) => void;+ openPopout: (state: StoreState) => void; openWidget: () => void; resizeWidget: (height: number) => void; removeWidget: () => void;@@ -23,10 +22,10 @@ setWidgetPosition: (position: 'left' | 'right') => void; };-export type LivechatMessageEventData<ApiType extends Record<string, any>> = {+export type LivechatMessageEventData<ApiType extends Record<string, any>, Fn extends keyof ApiType = keyof ApiType> = { src?: string;- fn: keyof ApiType;- args: Parameters<ApiType[keyof ApiType]>;+ fn: Fn;+ args: Parameters<ApiType[Fn]>; }; type InitializeParams = {@@ -61,6 +60,7 @@ let smallScreen = false; let scrollPosition: number; let widgetHeight: number;+let popoutWindow: Window | null = null; export const VALID_CALLBACKS = [ 'chat-maximized',@@ -103,6 +103,12 @@ }); }+const formatMessage = (action: keyof HooksWidgetAPI, ...params: Parameters<HooksWidgetAPI[keyof HooksWidgetAPI]>) => ({+ src: 'rocketchat',+ fn: action,+ args: params,+});+ // hooks function callHook(action: keyof HooksWidgetAPI, ...params: Parameters<HooksWidgetAPI[keyof HooksWidgetAPI]>) { if (!ready) {@@ -113,11 +119,7 @@ throw new Error('Widget is not initialized'); }- const data = {- src: 'rocketchat',- fn: action,- args: params,- };+ const data = formatMessage(action, ...params); iframe.contentWindow?.postMessage(data, '*'); }@@ -461,8 +463,6 @@ } const api: InternalWidgetAPI = {- popup: null,- openWidget, resizeWidget,@@ -475,27 +475,29 @@ minimizeWindow() { closeWidget(); },- restoreWindow() {- if (api.popup && api.popup.closed !== true) {- api.popup.close();- api.popup = null;+ if (popoutWindow && popoutWindow.closed !== true) {+ popoutWindow.close();+ popoutWindow = null; } openWidget(); },- openPopout(token = '') {+ openPopout(state: Partial<StoreState>) { closeWidget();+ if (!config.url) { throw new Error('Config.url is not set!'); }- const urlToken = token && `&token=${token}`;-- api.popup = window.open(- `${config.url}${config.url.lastIndexOf('?') > -1 ? '&' : '?'}mode=popout${urlToken}`,- 'livechat-popout',- `width=${WIDGET_OPEN_WIDTH}, height=${widgetHeight}, toolbars=no`,- );++ const url = new URL(config.url);+ url.searchParams.append('mode', 'popout');++ listenForMessageOnce('ready', () => {+ popoutWindow?.postMessage(formatMessage('syncState', state), '*');+ });++ popoutWindow = window.open(url, 'livechat-popout', `width=${WIDGET_OPEN_WIDTH}, height=${widgetHeight}, toolbars=no`); }, removeWidget() {@@ -628,16 +630,24 @@ title: null, };-function onNewMessage(event: MessageEvent<LivechatMessageEventData<Omit<InternalWidgetAPI, 'popup'>>>) {+function isValidMessage(event: MessageEvent<LivechatMessageEventData<InternalWidgetAPI>>) { if (event.source === event.target) {- return;+ return false; } if (!event.data || typeof event.data !== 'object') {- return;+ return false; } if (!event.data.src || event.data.src !== 'rocketchat') {+ return false;+ }++ return true;+}++function onNewMessage(event: MessageEvent<LivechatMessageEventData<InternalWidgetAPI>>) {+ if (!isValidMessage(event)) { return; }@@ -650,6 +660,22 @@ // There is an existing issue with overload resolution with type union arguments please see https://github.com/microsoft/TypeScript/issues/14107 // @ts-expect-error: A spread argument must either have a tuple type or be passed to a rest parameter api[fn](...args);+}++function listenForMessageOnce<K extends keyof InternalWidgetAPI>(+ key: K,+ callback: (data: LivechatMessageEventData<InternalWidgetAPI, K>) => void,+): void {+ const listener = (event: MessageEvent<LivechatMessageEventData<InternalWidgetAPI, K>>) => {+ if (!isValidMessage(event) || event.data.fn !== key) {+ return;+ }++ callback(event.data);+ window.removeEventListener('message', listener);+ };++ window.addEventListener('message', listener); } const attachMessageListener = () => {
Vulnerability Existed: yes
Cross-Site Scripting (XSS) via PostMessage [packages/livechat/src/widget.ts] [Lines 119-121, 628-660]
[Old Code]
function onNewMessage(event: MessageEvent<LivechatMessageEventData<Omit<InternalWidgetAPI, 'popup'>>>) {
if (event.source === event.target) {
return;
}
if (!event.data || typeof event.data !== 'object') {
return;
}
if (!event.data.src || event.data.src !== 'rocketchat') {
return;
}
const { fn, args } = event.data;
// There is an existing issue with overload resolution with type union arguments please see https://github.com/microsoft/TypeScript/issues/14107
// @ts-expect-error: A spread argument must either have a tuple type or be passed to a rest parameter
api[fn](...args);
}
[Fixed Code]
function isValidMessage(event: MessageEvent<LivechatMessageEventData<InternalWidgetAPI>>) {
if (event.source === event.target) {
return false;
}
if (!event.data || typeof event.data !== 'object') {
return false;
}
if (!event.data.src || event.data.src !== 'rocketchat') {
return false;
}
return true;
}
function onNewMessage(event: MessageEvent<LivechatMessageEventData<InternalWidgetAPI>>) {
if (!isValidMessage(event)) {
return;
}
const { fn, args } = event.data;
// There is an existing issue with overload resolution with type union arguments please see https://github.com/microsoft/TypeScript/issues/14107
// @ts-expect-error: A spread argument must either have a tuple type or be passed to a rest parameter
api[fn](...args);
}
Vulnerability Existed: yes
Insecure Direct Object Reference (IDOR) / Token Exposure [packages/livechat/src/widget.ts] [Lines 475-485]
[Old Code]
openPopout(token = '') {
closeWidget();
if (!config.url) {
throw new Error('Config.url is not set!');
}
const urlToken = token && `&token=${token}`;
api.popup = window.open(
`${config.url}${config.url.lastIndexOf('?') > -1 ? '&' : '?'}mode=popout${urlToken}`,
'livechat-popout',
`width=${WIDGET_OPEN_WIDTH}, height=${widgetHeight}, toolbars=no`,
);
},
[Fixed Code]
openPopout(state: Partial<StoreState>) {
closeWidget();
if (!config.url) {
throw new Error('Config.url is not set!');
}
const url = new URL(config.url);
url.searchParams.append('mode', 'popout');
listenForMessageOnce('ready', () => {
popoutWindow?.postMessage(formatMessage('syncState', state), '*');
});
popoutWindow = window.open(url, 'livechat-popout', `width=${WIDGET_OPEN_WIDTH}, height=${widgetHeight}, toolbars=no`);
},
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/mock-providers/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/mock-providers/CHANGELOG.md@@ -1,4 +1,13 @@ # @rocket.chat/mock-providers++## 0.2.5++### Patch Changes++- <details><summary>Updated dependencies []:</summary>++ - @rocket.chat/[email protected]+ </details> ## 0.2.4
Based on the provided diff, I cannot identify any security vulnerabilities as this is a changelog file update.
Vulnerability Existed: no
No vulnerability CHANGELOG.md 1-9
# @rocket.chat/mock-providers
# @rocket.chat/mock-providers
+
+## 0.2.5
+
+### Patch Changes
+
+- <details><summary>Updated dependencies []:</summary>
+
+ - @rocket.chat/[email protected]
+ </details>
The diff shows only version updates and dependency changes in a documentation file, which does not contain executable code that could introduce security vulnerabilities.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/mock-providers/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/mock-providers/package.json@@ -1,6 +1,6 @@ { "name": "@rocket.chat/mock-providers",- "version": "0.2.4",+ "version": "0.2.5", "private": true, "dependencies": { "@rocket.chat/emitter": "~0.31.25",
Vulnerability Existed: not sure No specific vulnerability identified packages/mock-providers/package.json 1 [Old Code] "version": "0.2.4", [Fixed Code] "version": "0.2.5", Note: This diff only shows a version bump in a package.json file with no code changes visible. Without additional context about what changed between versions 0.2.4 and 0.2.5, it's impossible to determine if any security vulnerabilities were fixed. Version bumps alone don't provide enough information to identify specific security issues.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/model-typings/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/model-typings/CHANGELOG.md@@ -1,4 +1,13 @@ # @rocket.chat/model-typings++## 1.6.5++### Patch Changes++- <details><summary>Updated dependencies []:</summary>++ - @rocket.chat/[email protected]+ </details> ## 1.6.4
Looking at the provided code diff, I can see that it only shows changes to a CHANGELOG.md file, which is documentation/metadata rather than actual source code. The diff shows version updates and dependency information, but no functional code changes.
Based on this limited information:
Vulnerability Existed: not sure
No code changes detected [packages/model-typings/CHANGELOG.md] [Lines 1-13]
[Old Code]
# @rocket.chat/model-typings
## 1.6.4
[Fixed Code]
# @rocket.chat/model-typings
## 1.6.5
### Patch Changes
- <details><summary>Updated dependencies []:</summary>
- @rocket.chat/[email protected]
</details>
## 1.6.4
The diff only shows version bump from 1.6.4 to 1.6.5 and updated dependency references. Since this is just changelog documentation and contains no actual code changes, I cannot identify any specific security vulnerabilities from this diff alone. The actual security fixes would likely be in the source code files that aren't shown in this diff.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/model-typings/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/model-typings/package.json@@ -1,6 +1,6 @@ { "name": "@rocket.chat/model-typings",- "version": "1.6.4",+ "version": "1.6.5", "private": true, "devDependencies": { "@types/node-rsa": "^1.1.4",
Vulnerability Existed: not sure [No specific vulnerability identified] packages/model-typings/package.json [1] [Old Code] "version": "1.6.4", [Fixed Code] "version": "1.6.5",
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/models/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/models/CHANGELOG.md@@ -1,4 +1,14 @@ # @rocket.chat/models++## 1.5.5++### Patch Changes++- <details><summary>Updated dependencies [8874a5aab72c962f213d128a54393d95f7dabef8]:</summary>++ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ </details> ## 1.5.4
Based on the provided code diff, I cannot identify any specific security vulnerabilities that were fixed. The diff only shows changes to a changelog file (CHANGELOG.md) which documents dependency updates, not actual code changes that would fix security issues.
Vulnerability Existed: no
No vulnerability found packages/models/CHANGELOG.md 1-14
# @rocket.chat/models
# @rocket.chat/models
+
+## 1.5.5
+
+### Patch Changes
+
+- <details><summary>Updated dependencies [8874a5aab72c962f213d128a54393d95f7dabef8]:</summary>
+
+ - @rocket.chat/[email protected]
+ - @rocket.chat/[email protected]
+ </details>
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/models/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/models/package.json@@ -1,6 +1,6 @@ { "name": "@rocket.chat/models",- "version": "1.5.4",+ "version": "1.5.5", "private": true, "devDependencies": { "@rocket.chat/jest-presets": "workspace:~",
Vulnerability Existed: not sure No specific vulnerability identified packages/models/package.json 1 - "version": "1.5.4", + "version": "1.5.5",
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/rest-typings/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/rest-typings/CHANGELOG.md@@ -1,4 +1,15 @@ # @rocket.chat/rest-typings++## 7.7.2++### Patch Changes++- ([#36298](https://github.com/RocketChat/Rocket.Chat/pull/36298) by [@dionisio-bot](https://github.com/dionisio-bot)) Fixes an issue that prevented the action of removing an agent when editing a department to work.++- <details><summary>Updated dependencies []:</summary>++ - @rocket.chat/[email protected]+ </details> ## 7.7.1
Based on the provided code diff, I cannot identify any security vulnerabilities. The changes shown are only to the CHANGELOG.md file, which contains documentation updates and dependency information, not actual code changes that could introduce or fix security issues.
Vulnerability Existed: no
No security vulnerability found in packages/rest-typings/CHANGELOG.md
Old Code: # @rocket.chat/rest-typings
Fixed Code: # @rocket.chat/rest-typings
... (changelog entries added)
The diff only shows the addition of version 7.7.2 changelog entries, including a bug fix for removing agents when editing departments and dependency updates. These appear to be routine maintenance changes rather than security patches.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/rest-typings/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/rest-typings/package.json@@ -1,6 +1,6 @@ { "name": "@rocket.chat/rest-typings",- "version": "7.7.1",+ "version": "7.7.2", "devDependencies": { "@rocket.chat/apps-engine": "workspace:^", "@rocket.chat/eslint-config": "workspace:~",
Vulnerability Existed: no No specific vulnerability found in this diff packages/rest-typings/package.json Lines 3 Old Code: "version": "7.7.1", Fixed Code: "version": "7.7.2", Note: This diff only shows a version number update from 7.7.1 to 7.7.2 in the package.json file. No code changes or dependency updates are visible in this specific diff that would indicate a security vulnerability fix. Version bumps often include security fixes, but without seeing the actual code changes in other files or dependency updates, we cannot identify specific vulnerabilities from this diff alone.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/rest-typings/src/v1/omnichannel.ts+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/rest-typings/src/v1/omnichannel.ts@@ -215,6 +215,10 @@ order: { type: 'number', },+ departmentEnabled: { type: 'boolean' },+ departmentId: { type: 'string' },+ _id: { type: 'string' },+ _updatedAt: { type: 'string' }, }, required: ['agentId', 'username'], additionalProperties: false,
Vulnerability Existed: not sure
Information Disclosure or Data Integrity [packages/rest-typings/src/v1/omnichannel.ts] [Lines 215+]
[Old Code]
```typescript
order: {
type: 'number',
},
```
[Fixed Code]
```typescript
order: {
type: 'number',
},
departmentEnabled: { type: 'boolean' },
departmentId: { type: 'string' },
_id: { type: 'string' },
_updatedAt: { type: 'string' },
```
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/ui-avatar/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/ui-avatar/CHANGELOG.md@@ -1,5 +1,14 @@ # @rocket.chat/ui-avatar+## 15.0.2++### Patch Changes++- <details><summary>Updated dependencies []:</summary>++ - @rocket.chat/[email protected]+ </details>+ ## 15.0.1 ### Patch Changes
Based on the provided code diff, I cannot identify any security vulnerabilities as the changes are only to a changelog file.
Vulnerability Existed: no
No vulnerability found packages/ui-avatar/CHANGELOG.md Lines 1-14
# @rocket.chat/ui-avatar
# @rocket.chat/ui-avatar
+
+## 15.0.2
+
+### Patch Changes
+
+- <details><summary>Updated dependencies []:</summary>
+
+ - @rocket.chat/[email protected]
+ </details>
+
## 15.0.1
The diff only shows:
1. Addition of a new version entry (15.0.2) in the changelog
2. Mention of updated dependencies (specifically @rocket.chat/[email protected])
3. No actual code changes that could introduce or fix security vulnerabilities
Changelog files typically document version history and changes but don't contain executable code that could have security implications.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/ui-avatar/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/ui-avatar/package.json@@ -1,6 +1,6 @@ { "name": "@rocket.chat/ui-avatar",- "version": "15.0.1",+ "version": "15.0.2", "private": true, "devDependencies": { "@babel/core": "~7.26.0",
Vulnerability Existed: not sure [No specific vulnerability name identified] packages/ui-avatar/package.json [1] [Old Code] ```json "version": "15.0.1" ``` [Fixed Code] ```json "version": "15.0.2" ``` Note: This diff only shows a version number update in a package.json file. Without additional context about what changed between versions 15.0.1 and 15.0.2, it's impossible to determine if this update contains security fixes. Version bumps can include security patches, but they can also include feature additions, bug fixes, or other changes.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/ui-client/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/ui-client/CHANGELOG.md@@ -1,4 +1,14 @@ # @rocket.chat/ui-client++## 19.0.2++### Patch Changes++- <details><summary>Updated dependencies []:</summary>++ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ </details> ## 19.0.1
Based on the provided code diff, I cannot identify any security vulnerabilities as this is a changelog file update.
Vulnerability Existed: no
N/A packages/ui-client/CHANGELOG.md Lines 1-14
# @rocket.chat/ui-client
# @rocket.chat/ui-client
+
+## 19.0.2
+
+### Patch Changes
+
+- <details><summary>Updated dependencies []:</summary>
+
+ - @rocket.chat/[email protected]
+ - @rocket.chat/[email protected]
+ </details>
+
+## 19.0.1
The diff only shows an update to the changelog file documenting version 19.0.2 and its dependency updates. Changelog files typically contain release notes and do not contain executable code that could introduce security vulnerabilities.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/ui-client/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/ui-client/package.json@@ -1,6 +1,6 @@ { "name": "@rocket.chat/ui-client",- "version": "19.0.1",+ "version": "19.0.2", "private": true, "main": "./dist/index.js", "typings": "./dist/index.d.ts",
Vulnerability Existed: not sure No specific vulnerability identified packages/ui-client/package.json 2 Old Code: `"version": "19.0.1",` Fixed Code: `"version": "19.0.2",`
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/ui-contexts/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/ui-contexts/CHANGELOG.md@@ -1,4 +1,15 @@ # @rocket.chat/ui-contexts++## 19.0.2++### Patch Changes++- <details><summary>Updated dependencies [8874a5aab72c962f213d128a54393d95f7dabef8]:</summary>++ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ </details> ## 19.0.1
Looking at the provided diff, I can see that it only shows changes to a CHANGELOG.md file, which is documentation/metadata, not actual code changes. There are no code modifications that would indicate security fixes in this diff.
Based on the analysis:
Vulnerability Existed: no
No code changes detected [packages/ui-contexts/CHANGELOG.md] [Lines 1-15]
[No old code to show]
[No fixed code to show]
The diff only shows version updates in the changelog file, indicating dependency updates but no actual code changes that would reveal security vulnerabilities or their fixes. To properly analyze security fixes, I would need to see actual code diffs rather than just changelog updates.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/ui-contexts/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/ui-contexts/package.json@@ -1,6 +1,6 @@ { "name": "@rocket.chat/ui-contexts",- "version": "19.0.1",+ "version": "19.0.2", "private": true, "devDependencies": { "@rocket.chat/core-typings": "workspace:^",
Vulnerability Existed: not sure [No specific vulnerability identified] packages/ui-contexts/package.json [2] [Old Code] "version": "19.0.1", [Fixed Code] "version": "19.0.2",
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/ui-video-conf/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/ui-video-conf/CHANGELOG.md@@ -1,4 +1,14 @@ # @rocket.chat/ui-video-conf++## 19.0.2++### Patch Changes++- <details><summary>Updated dependencies []:</summary>++ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ </details> ## 19.0.1
Based on the provided code diff, I cannot identify any security vulnerabilities as the changes are only to a changelog file.
Vulnerability Existed: no
No vulnerability CHANGELOG.md All lines
# @rocket.chat/ui-video-conf
# @rocket.chat/ui-video-conf
+
+## 19.0.2
+
+### Patch Changes
+
+- <details><summary>Updated dependencies []:</summary>
+
+ - @rocket.chat/[email protected]
+ - @rocket.chat/[email protected]
+ </details>
The diff shows only version updates and dependency information in a changelog file, which does not contain executable code that could introduce security vulnerabilities.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/ui-video-conf/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/ui-video-conf/package.json@@ -1,6 +1,6 @@ { "name": "@rocket.chat/ui-video-conf",- "version": "19.0.1",+ "version": "19.0.2", "private": true, "main": "./dist/index.js", "typings": "./dist/index.d.ts",
Vulnerability Existed: not sure No specific vulnerability identified packages/ui-video-conf/package.json 1 Old Code: "version": "19.0.1", Fixed Code: "version": "19.0.2",
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/ui-voip/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/ui-voip/CHANGELOG.md@@ -1,4 +1,15 @@ # @rocket.chat/ui-voip++## 9.0.2++### Patch Changes++- <details><summary>Updated dependencies []:</summary>++ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ - @rocket.chat/[email protected]+ </details> ## 9.0.1
Based on the provided code diff, I cannot identify any security vulnerabilities as the changes are only to a changelog file documenting version updates and dependencies.
Vulnerability Existed: no
No vulnerability found packages/ui-voip/CHANGELOG.md Lines 1-15
# @rocket.chat/ui-voip
# @rocket.chat/ui-voip
+
+## 9.0.2
+
+### Patch Changes
+
+- <details><summary>Updated dependencies []:</summary>
+
+ - @rocket.chat/[email protected]
+ - @rocket.chat/[email protected]
+ - @rocket.chat/[email protected]
+ </details>
The diff only shows additions to a changelog file, which is documentation and doesn't contain executable code that could introduce security vulnerabilities.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/ui-voip/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/ui-voip/package.json@@ -1,6 +1,6 @@ { "name": "@rocket.chat/ui-voip",- "version": "9.0.1",+ "version": "9.0.2", "private": true, "main": "./dist/index.js", "typings": "./dist/index.d.ts",
Vulnerability Existed: not sure No specific vulnerability identified packages/ui-voip/package.json 2 Old Code: `"version": "9.0.1",` Fixed Code: `"version": "9.0.2",`
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/web-ui-registration/CHANGELOG.md+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/web-ui-registration/CHANGELOG.md@@ -1,4 +1,13 @@ # @rocket.chat/web-ui-registration++## 19.0.2++### Patch Changes++- <details><summary>Updated dependencies []:</summary>++ - @rocket.chat/[email protected]+ </details> ## 19.0.1
Based on the provided diff, I cannot identify any security vulnerabilities as this is a changelog file update showing version changes and dependency updates. Vulnerability Existed: no No security vulnerability found in CHANGELOG.md [Old Code] # @rocket.chat/web-ui-registration [Fixed Code] # @rocket.chat/web-ui-registration + +## 19.0.2 + +### Patch Changes + +- <details><summary>Updated dependencies []:</summary> + + - @rocket.chat/[email protected] + </details> ## 19.0.1 Note: This diff only shows version updates and dependency changes in a changelog file, which typically doesn't contain code changes that would introduce or fix security vulnerabilities. Security fixes would normally be visible in source code files rather than documentation files like CHANGELOG.md.
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.
--- /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.1/Rocket.Chat-7.7.1/packages/web-ui-registration/package.json+++ /root/PatchLeaks-main/products/Rocket.Chat_downloads/7.7.2/Rocket.Chat-7.7.2/packages/web-ui-registration/package.json@@ -1,6 +1,6 @@ { "name": "@rocket.chat/web-ui-registration",- "version": "19.0.1",+ "version": "19.0.2", "private": true, "homepage": "https://rocket.chat", "main": "./dist/index.js",
Vulnerability Existed: not sure [No specific vulnerability name identified] packages/web-ui-registration/package.json [Lines: 3] [Old Code] "version": "19.0.1", [Fixed Code] "version": "19.0.2",
rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of rocket.chat. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 3000 by default. The issue results from incorrect authorization. An attacker can leverage this vulnerability to disclose information in the context of the application. Was ZDI-CAN-26517.