Zulip is an open-source team collaboration tool. Versions 2.1.0 through and including 5.2 are vulnerable to a logic error. A stream configured as private with protected history, where new subscribers should not be allowed to see messages sent before they were subscribed, when edited causes the server to incorrectly send an API event that includes the edited message to all of the stream’s current subscribers. This API event is ignored by official clients, but can be observed by using a modified client or the browser’s developer tools. This bug will be fixed in Zulip Server 5.3. There are no known workarounds.
References
Link | Resource |
---|---|
https://github.com/zulip/zulip/security/advisories/GHSA-m5j3-jp59-6f3q | Third Party Advisory |
Configurations
History
07 Jul 2022, 18:33
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 2.1
v3 : 2.6 |
References | (CONFIRM) https://github.com/zulip/zulip/security/advisories/GHSA-m5j3-jp59-6f3q - Third Party Advisory | |
CPE | cpe:2.3:a:zulip:zulip:*:*:*:*:*:*:*:* |
25 Jun 2022, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-06-25 09:15
Updated : 2024-02-04 22:29
NVD link : CVE-2022-31017
Mitre link : CVE-2022-31017
CVE.ORG link : CVE-2022-31017
JSON object : View
Products Affected
zulip
- zulip