Zulip is an open source team chat app. The `main` development branch of Zulip Server from June 2021 and later is vulnerable to a cross-site scripting vulnerability on the recent topics page. An attacker could maliciously craft a full name for their account and send messages to a topic with several participants; a victim who then opens an overflow tooltip including this full name on the recent topics page could trigger execution of JavaScript code controlled by the attacker. Users running a Zulip server from the main branch should upgrade from main (2022-03-01 or later) again to deploy this fix.
References
Link | Resource |
---|---|
https://github.com/zulip/zulip/security/advisories/GHSA-fc77-h3jc-6mfv | Third Party Advisory |
https://github.com/zulip/zulip/commit/e090027adcbf62737d5b1f83a9618a9500a49321 | Patch Third Party Advisory |
Configurations
Information
Published : 2022-03-02 13:15
Updated : 2022-03-09 13:10
NVD link : CVE-2022-23656
Mitre link : CVE-2022-23656
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
zulip
- zulip_server