Vulnerability Details : CVE-2022-31017
Zulip is an open-source team collaboration tool. Versions 2.1.0 through and including 5.2 are vulnerable to a logic error. A stream configured as private with protected history, where new subscribers should not be allowed to see messages sent before they were subscribed, when edited causes the server to incorrectly send an API event that includes the edited message to all of the stream’s current subscribers. This API event is ignored by official clients, but can be observed by using a modified client or the browser’s developer tools. This bug will be fixed in Zulip Server 5.3. There are no known workarounds.
Products affected by CVE-2022-31017
- cpe:2.3:a:zulip:zulip:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-31017
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 17 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-31017
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:N/AC:H/Au:S/C:P/I:N/A:N |
3.9
|
2.9
|
NIST | |
2.6
|
LOW | CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N |
1.2
|
1.4
|
NIST | |
2.0
|
LOW | CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N |
0.5
|
1.4
|
GitHub, Inc. |
CWE ids for CVE-2022-31017
-
The product contains an expression that will always evaluate to true.Assigned by: security-advisories@github.com (Primary)
-
The code contains a control flow path that does not reflect the algorithm that the path is intended to implement, leading to incorrect behavior any time this path is navigated.Assigned by: security-advisories@github.com (Primary)
References for CVE-2022-31017
-
https://github.com/zulip/zulip/security/advisories/GHSA-m5j3-jp59-6f3q
Zulip Server exposes edit events for old messages to new subscribers in protected-history streams · Advisory · zulip/zulip · GitHubThird Party Advisory
Jump to