In Zulip Server versions from 1.7.0 to before 2.0.7, a bug in the new user signup process meant that users who registered their account using social authentication (e.g., GitHub or Google SSO) in an organization that also allows password authentication could have their personal API key stolen by an unprivileged attacker, allowing nearly full access to the user's account.
References
Link | Resource |
---|---|
https://blog.zulip.org/2019/11/21/zulip-2-0-7-security-release/ | Vendor Advisory |
https://github.com/zulip/zulip/commit/0c2cc41d2e40807baa5ee2c72987ebfb64ea2eb6 | Patch |
Configurations
History
No history.
Information
Published : 2019-11-21 23:15
Updated : 2024-02-04 20:39
NVD link : CVE-2019-18933
Mitre link : CVE-2019-18933
CVE.ORG link : CVE-2019-18933
JSON object : View
Products Affected
zulip
- zulip_server
CWE