In Zulip Server versions from 1.7.0 to before 2.0.7, a bug in the new user signup process meant that users who registered their account using social authentication (e.g., GitHub or Google SSO) in an organization that also allows password authentication could have their personal API key stolen by an unprivileged attacker, allowing nearly full access to the user's account.
References
Link | Resource |
---|---|
https://blog.zulip.org/2019/11/21/zulip-2-0-7-security-release/ | Vendor Advisory |
https://github.com/zulip/zulip/commit/0c2cc41d2e40807baa5ee2c72987ebfb64ea2eb6 | Patch |
Configurations
Information
Published : 2019-11-21 15:15
Updated : 2020-08-24 10:37
NVD link : CVE-2019-18933
Mitre link : CVE-2019-18933
JSON object : View
CWE
Products Affected
zulip
- zulip_server