First published: Wed Sep 18 2019(Updated: )
Zulip server before 2.0.5 incompletely validated the MIME types of uploaded files. A user who is logged into the server could upload files of certain types to mount a stored cross-site scripting attack on other logged-in users. On a Zulip server using the default local uploads backend, the attack is only effective against browsers lacking support for Content-Security-Policy such as Internet Explorer 11. On a Zulip server using the S3 uploads backend, the attack is confined to the origin of the configured S3 uploads hostname and cannot reach the Zulip server itself.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zulip Server | >=1.8.0<2.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-16216 refers to a vulnerability in the Zulip server before version 2.0.5 that incompletely validates the MIME types of uploaded files, allowing for a stored cross-site scripting attack.
CVE-2019-16216 has a severity rating of 5.4, which is considered medium.
CVE-2019-16216 affects Zulip server versions before 2.0.5 by allowing logged-in users to upload certain file types and mount a stored cross-site scripting attack on other logged-in users.
To fix CVE-2019-16216, it is recommended to update the Zulip server to version 2.0.5 or later.
The CWE ID for CVE-2019-16216 is 79.