Filtered by vendor Zulip
Subscribe
Total
47 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-30477 | 1 Zulip | 1 Zulip Server | 2022-07-12 | 4.0 MEDIUM | 4.3 MEDIUM |
An issue was discovered in Zulip Server before 3.4. A bug in the implementation of replies to messages sent by outgoing webhooks to private streams meant that an outgoing webhook bot could be used to send messages to private streams that the user was not intended to be able to send messages to. | |||||
CVE-2021-30487 | 1 Zulip | 1 Zulip Server | 2022-07-12 | 4.0 MEDIUM | 2.7 LOW |
In the topic moving API in Zulip Server 3.x before 3.4, organization administrators were able to move messages to streams in other organizations hosted by the same Zulip installation. | |||||
CVE-2021-30479 | 1 Zulip | 1 Zulip Server | 2022-07-12 | 5.0 MEDIUM | 5.3 MEDIUM |
An issue was discovered in Zulip Server before 3.4. A bug in the implementation of the all_public_streams API feature resulted in guest users being able to receive message traffic to public streams that should have been only accessible to members of the organization. | |||||
CVE-2022-31017 | 1 Zulip | 1 Zulip | 2022-07-07 | 2.1 LOW | 2.6 LOW |
Zulip is an open-source team collaboration tool. Versions 2.1.0 through and including 5.2 are vulnerable to a logic error. A stream configured as private with protected history, where new subscribers should not be allowed to see messages sent before they were subscribed, when edited causes the server to incorrectly send an API event that includes the edited message to all of the stream’s current subscribers. This API event is ignored by official clients, but can be observed by using a modified client or the browser’s developer tools. This bug will be fixed in Zulip Server 5.3. There are no known workarounds. | |||||
CVE-2022-24751 | 1 Zulip | 1 Zulip | 2022-03-22 | 5.8 MEDIUM | 7.4 HIGH |
Zulip is an open source group chat application. Starting with version 4.0 and prior to version 4.11, Zulip is vulnerable to a race condition during account deactivation, where a simultaneous access by the user being deactivated may, in rare cases, allow continued access by the deactivated user. A patch is available in version 4.11 on the 4.x branch and version 5.0-rc1 on the 5.x branch. Upgrading to a fixed version will, as a side effect, deactivate any cached sessions that may have been leaked through this bug. There are currently no known workarounds. | |||||
CVE-2022-23656 | 1 Zulip | 1 Zulip Server | 2022-03-09 | 3.5 LOW | 5.4 MEDIUM |
Zulip is an open source team chat app. The `main` development branch of Zulip Server from June 2021 and later is vulnerable to a cross-site scripting vulnerability on the recent topics page. An attacker could maliciously craft a full name for their account and send messages to a topic with several participants; a victim who then opens an overflow tooltip including this full name on the recent topics page could trigger execution of JavaScript code controlled by the attacker. Users running a Zulip server from the main branch should upgrade from main (2022-03-01 or later) again to deploy this fix. | |||||
CVE-2021-3866 | 1 Zulip | 1 Zulip | 2022-02-03 | 3.5 LOW | 5.4 MEDIUM |
Cross-site Scripting (XSS) - Stored in GitHub repository zulip/zulip more than and including 44f935695d452cc3fb16845a0c6af710438b153d and prior to 3eb2791c3e9695f7d37ffe84e0c2184fae665cb6. | |||||
CVE-2021-43799 | 1 Zulip | 1 Zulip | 2022-02-02 | 5.0 MEDIUM | 9.8 CRITICAL |
Zulip is an open-source team collaboration tool. Zulip Server installs RabbitMQ for internal message passing. In versions of Zulip Server prior to 4.9, the initial installation (until first reboot, or restart of RabbitMQ) does not successfully limit the default ports which RabbitMQ opens; this includes port 25672, the RabbitMQ distribution port, which is used as a management port. RabbitMQ's default "cookie" which protects this port is generated using a weak PRNG, which limits the entropy of the password to at most 36 bits; in practicality, the seed for the randomizer is biased, resulting in approximately 20 bits of entropy. If other firewalls (at the OS or network level) do not protect port 25672, a remote attacker can brute-force the 20 bits of entropy in the "cookie" and leverage it for arbitrary execution of code as the rabbitmq user. They can also read all data which is sent through RabbitMQ, which includes all message traffic sent by users. Version 4.9 contains a patch for this vulnerability. As a workaround, ensure that firewalls prevent access to ports 5672 and 25672 from outside the Zulip server. | |||||
CVE-2021-43791 | 1 Zulip | 1 Zulip | 2021-12-03 | 5.0 MEDIUM | 5.3 MEDIUM |
Zulip is an open source group chat application that combines real-time chat with threaded conversations. In affected versions expiration dates on the confirmation objects associated with email invitations were not enforced properly in the new account registration flow. A confirmation link takes a user to the check_prereg_key_and_redirect endpoint, before getting redirected to POST to /accounts/register/. The problem was that validation was happening in the check_prereg_key_and_redirect part and not in /accounts/register/ - meaning that one could submit an expired confirmation key and be able to register. The issue is fixed in Zulip 4.8. There are no known workarounds and users are advised to upgrade as soon as possible. | |||||
CVE-2020-14215 | 1 Zulip | 1 Zulip Server | 2021-07-21 | 5.0 MEDIUM | 7.5 HIGH |
Zulip Server before 2.1.5 has Incorrect Access Control because 0198_preregistrationuser_invited_as adds the administrator role to invitations. | |||||
CVE-2020-10858 | 1 Zulip | 1 Zulip Desktop | 2021-07-21 | 5.0 MEDIUM | 5.3 MEDIUM |
Zulip Desktop before 5.0.0 allows attackers to perform recording via the webcam and microphone due to a missing permission request handler. | |||||
CVE-2020-15070 | 1 Zulip | 1 Zulip Server | 2021-07-21 | 6.5 MEDIUM | 8.8 HIGH |
Zulip Server 2.x before 2.1.7 allows eval injection if a privileged attacker were able to write directly to the postgres database, and chose to write a crafted custom profile field value. | |||||
CVE-2020-14194 | 1 Zulip | 1 Zulip Server | 2021-07-21 | 5.8 MEDIUM | 5.4 MEDIUM |
Zulip Server before 2.1.5 allows reverse tabnapping via a topic header link. | |||||
CVE-2020-10857 | 1 Zulip | 1 Zulip Desktop | 2021-02-08 | 7.5 HIGH | 9.8 CRITICAL |
Zulip Desktop before 5.0.0 improperly uses shell.openExternal and shell.openItem with untrusted content, leading to remote code execution. | |||||
CVE-2020-12759 | 1 Zulip | 1 Zulip Server | 2020-08-26 | 4.3 MEDIUM | 6.1 MEDIUM |
Zulip Server before 2.1.5 allows reflected XSS via the Dropbox webhook. | |||||
CVE-2019-18933 | 1 Zulip | 1 Zulip Server | 2020-08-24 | 7.5 HIGH | 9.8 CRITICAL |
In Zulip Server versions from 1.7.0 to before 2.0.7, a bug in the new user signup process meant that users who registered their account using social authentication (e.g., GitHub or Google SSO) in an organization that also allows password authentication could have their personal API key stolen by an unprivileged attacker, allowing nearly full access to the user's account. | |||||
CVE-2020-10935 | 1 Zulip | 1 Zulip Server | 2020-04-28 | 3.5 LOW | 5.4 MEDIUM |
Zulip Server before 2.1.3 allows XSS via a Markdown link, with resultant account takeover. | |||||
CVE-2020-9444 | 1 Zulip | 1 Zulip Server | 2020-04-28 | 5.8 MEDIUM | 6.1 MEDIUM |
Zulip Server before 2.1.3 allows reverse tabnabbing via the Markdown functionality. | |||||
CVE-2020-9445 | 1 Zulip | 1 Zulip Server | 2020-04-27 | 4.3 MEDIUM | 6.1 MEDIUM |
Zulip Server before 2.1.3 allows XSS via the modal_link feature in the Markdown functionality. | |||||
CVE-2019-19775 | 1 Zulip | 1 Zulip Server | 2019-12-18 | 5.8 MEDIUM | 6.1 MEDIUM |
The image thumbnailing handler in Zulip Server versions 1.9.0 to before 2.0.8 allowed an open redirect that was visible to logged-in users. |