CVE-2023-33186

Zulip is an open-source team collaboration tool with unique topic-based threading that combines the best of email and chat to make remote work productive and delightful. The main development branch of Zulip Server from May 2, 2023 and later, including beta versions 7.0-beta1 and 7.0-beta2, is vulnerable to a cross-site scripting vulnerability in tooltips on the message feed. An attacker who can send messages could maliciously craft a topic for the message, such that a victim who hovers the tooltip for that topic in their message feed triggers execution of JavaScript code controlled by the attacker.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:zulip:zulip_server:7.0:beta1:*:*:*:*:*:*
cpe:2.3:a:zulip:zulip_server:7.0:beta2:*:*:*:*:*:*

History

21 Nov 2024, 08:05

Type Values Removed Values Added
References () https://github.com/zulip/zulip/commit/03cfb3d9fe61c975d133121ec31a7357f0c9e18f - () https://github.com/zulip/zulip/commit/03cfb3d9fe61c975d133121ec31a7357f0c9e18f -
References () https://github.com/zulip/zulip/commit/3ca131743b00f42bad8edbac4ef92656d954c629 - Patch () https://github.com/zulip/zulip/commit/3ca131743b00f42bad8edbac4ef92656d954c629 - Patch
References () https://github.com/zulip/zulip/pull/25370 - Issue Tracking, Patch () https://github.com/zulip/zulip/pull/25370 - Issue Tracking, Patch
References () https://github.com/zulip/zulip/security/advisories/GHSA-4r83-8f94-hrph - Vendor Advisory () https://github.com/zulip/zulip/security/advisories/GHSA-4r83-8f94-hrph - Vendor Advisory
CVSS v2 : unknown
v3 : 6.1
v2 : unknown
v3 : 8.2

06 Nov 2023, 19:15

Type Values Removed Values Added
References
  • {'url': 'https://github.com/zulip/zulip/commit/903dbda79bd176702d3175a7c8a5450a64b6eccb', 'name': 'https://github.com/zulip/zulip/commit/903dbda79bd176702d3175a7c8a5450a64b6eccb', 'tags': ['Patch'], 'refsource': 'MISC'}

02 Nov 2023, 17:15

Type Values Removed Values Added
References
  • (MISC) https://github.com/zulip/zulip/commit/03cfb3d9fe61c975d133121ec31a7357f0c9e18f -

06 Jun 2023, 16:01

Type Values Removed Values Added
First Time Zulip zulip Server
Zulip
CPE cpe:2.3:a:zulip:zulip_server:7.0:beta2:*:*:*:*:*:*
cpe:2.3:a:zulip:zulip_server:7.0:beta1:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
CWE CWE-79
References (MISC) https://github.com/zulip/zulip/security/advisories/GHSA-4r83-8f94-hrph - (MISC) https://github.com/zulip/zulip/security/advisories/GHSA-4r83-8f94-hrph - Vendor Advisory
References (MISC) https://github.com/zulip/zulip/commit/3ca131743b00f42bad8edbac4ef92656d954c629 - (MISC) https://github.com/zulip/zulip/commit/3ca131743b00f42bad8edbac4ef92656d954c629 - Patch
References (MISC) https://github.com/zulip/zulip/pull/25370 - (MISC) https://github.com/zulip/zulip/pull/25370 - Issue Tracking, Patch
References (MISC) https://github.com/zulip/zulip/commit/903dbda79bd176702d3175a7c8a5450a64b6eccb - (MISC) https://github.com/zulip/zulip/commit/903dbda79bd176702d3175a7c8a5450a64b6eccb - Patch

30 May 2023, 06:16

Type Values Removed Values Added
New CVE

Information

Published : 2023-05-30 06:16

Updated : 2024-11-21 08:05


NVD link : CVE-2023-33186

Mitre link : CVE-2023-33186

CVE.ORG link : CVE-2023-33186


JSON object : View

Products Affected

zulip

  • zulip_server
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')