Description
In Zulip Server versions from 1.7.0 to before 2.0.7, a bug in the new user signup process meant that users who registered their account using social authentication (e.g., GitHub or Google SSO) in an organization that also allows password authentication could have their personal API key stolen by an unprivileged attacker, allowing nearly full access to the user's account.
References (2)
Core 2
Core References
Vendor Advisory x_refsource_confirm
https://blog.zulip.org/2019/11/21/zulip-2-0-7-security-release/
Patch x_refsource_misc
https://github.com/zulip/zulip/commit/0c2cc41d2e40807baa5ee2c72987ebfb64ea2eb6
Scores
CVSS v3
9.8
EPSS
0.0043
EPSS Percentile
62.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
Status
published
Products (1)
zulip/zulip_server
1.7.0 - 2.0.7
Published
Nov 21, 2019
Tracked Since
Feb 18, 2026