CVE-2017-0896
Published Jun 2, 2017
Last updated a year ago
Overview
- Description
- Zulip Server 1.5.1 and below suffer from an error in the implementation of the invite_by_admins_only setting in the Zulip group chat application server that allowed an authenticated user to invite other users to join a Zulip organization even if the organization was configured to prevent this.
- Source
- support@hackerone.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 6.5
- Impact score
- 3.6
- Exploitability score
- 2.8
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 4
- Impact score
- 2.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:N/I:P/A:N
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:zulip:zulip_server:1.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "03ECA4CD-B128-45EA-8A19-5F137BD08690" }, { "criteria": "cpe:2.3:a:zulip:zulip_server:1.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0609969D-7C68-4428-A2F3-EA532F6C4045" }, { "criteria": "cpe:2.3:a:zulip:zulip_server:1.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6141BC81-A452-44F0-9A61-B82772D406FF" }, { "criteria": "cpe:2.3:a:zulip:zulip_server:1.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F3662F33-CC19-46AE-902F-2A685030FDE3" }, { "criteria": "cpe:2.3:a:zulip:zulip_server:1.3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A20311C-FC51-4ED5-BCBC-955543FD1AF5" }, { "criteria": "cpe:2.3:a:zulip:zulip_server:1.3.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B4CC0654-4F8C-4D1B-B06F-035368E7B120" }, { "criteria": "cpe:2.3:a:zulip:zulip_server:1.3.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "13048A35-82DA-45AF-BB3C-AEBD1A80734B" }, { "criteria": "cpe:2.3:a:zulip:zulip_server:1.3.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BE689D6F-F774-41AF-B97A-23973E22C9C9" }, { "criteria": "cpe:2.3:a:zulip:zulip_server:1.3.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7C300421-CBDE-4DC2-A41E-38AFDD498725" }, { "criteria": "cpe:2.3:a:zulip:zulip_server:1.3.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "08DE09CC-3869-4686-A36D-F42788FC7118" }, { "criteria": "cpe:2.3:a:zulip:zulip_server:1.3.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A6AAE8C-F5E6-4A9C-9AF1-0D03EB9A7E97" }, { "criteria": "cpe:2.3:a:zulip:zulip_server:1.3.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "612DA887-F6BC-45F8-B187-AE23CF2F1027" }, { "criteria": "cpe:2.3:a:zulip:zulip_server:1.3.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A21AE1B1-5A7E-447A-9301-1AD965F04833" }, { "criteria": "cpe:2.3:a:zulip:zulip_server:1.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "034098C9-DCC3-46CC-9534-811F28F4493D" }, { "criteria": "cpe:2.3:a:zulip:zulip_server:1.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EA56546E-7E0A-49EB-967A-7219C907BE50" }, { "criteria": "cpe:2.3:a:zulip:zulip_server:1.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2CF03C39-6873-4044-96B8-760156D7B1BE" }, { "criteria": "cpe:2.3:a:zulip:zulip_server:1.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A0167E36-42E4-4DA5-96FB-CFF0EC8FDA38" }, { "criteria": "cpe:2.3:a:zulip:zulip_server:1.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3914FE1E-E734-4B4A-8266-25FB5C32800D" }, { "criteria": "cpe:2.3:a:zulip:zulip_server:1.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B25BEDD5-B562-4A2E-8284-07A47CB1F6D3" } ], "operator": "OR" } ] } ]