// For flags

CVE-2022-31017

Expression Always True vulnerability in Zulip Server

Severity Score

2.6
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Zulip is an open-source team collaboration tool. Versions 2.1.0 through and including 5.2 are vulnerable to a logic error. A stream configured as private with protected history, where new subscribers should not be allowed to see messages sent before they were subscribed, when edited causes the server to incorrectly send an API event that includes the edited message to all of the stream’s current subscribers. This API event is ignored by official clients, but can be observed by using a modified client or the browser’s developer tools. This bug will be fixed in Zulip Server 5.3. There are no known workarounds.

Zulip es una herramienta de colaboración en equipo de código abierto. Las versiones 2.1.0 hasta 5.2 incluyéndola, son vulnerables a un error lógico. Un flujo configurado como privado con historial protegido, en el que los nuevos suscriptores no deberían poder visualizar los mensajes enviados antes de estar suscritos, cuando es editado causa que el servidor envíe incorrectamente un evento de la API que incluye el mensaje editado a todos los suscriptores actuales del flujo. Este evento de la API es ignorado por los clientes oficiales, pero puede ser observado al usar un cliente modificado o las herramientas de desarrollo del navegador. Este bug será corregido en Zulip Server versión 5.3. No se presentan mitigaciones conocidas

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
High
Privileges Required
High
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
High
Authentication
Single
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-05-18 CVE Reserved
  • 2022-06-25 CVE Published
  • 2024-08-03 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-571: Expression is Always True
  • CWE-670: Always-Incorrect Control Flow Implementation
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Zulip
Search vendor "Zulip"
Zulip
Search vendor "Zulip" for product "Zulip"
>= 2.1.0 < 5.3
Search vendor "Zulip" for product "Zulip" and version " >= 2.1.0 < 5.3"
-
Affected