First published: Fri Aug 25 2023(Updated: )
Zulip is an open-source team collaboration tool with topic-based threading that combines email and chat. Users who used to be subscribed to a private stream and have been removed from it since retain the ability to edit messages/topics, move messages to other streams, and delete messages that they used to have access to, if other relevant organization permissions allow these actions. For example, a user may be able to edit or delete their old messages they posted in such a private stream. An administrator will be able to delete old messages (that they had access to) from the private stream. This issue was fixed in Zulip Server version 7.3.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Zulip Server | <7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32678 is a vulnerability in Zulip, an open-source team collaboration tool, that allows users who were previously subscribed to a private stream to retain the ability to edit, move, and delete messages/topics even after being removed from the stream.
CVE-2023-32678 has a severity rating of medium, with a severity value of 6.5.
CVE-2023-32678 affects Zulip versions up to and excluding 7.3.
To fix CVE-2023-32678, users of Zulip are advised to update to version 7.3 or higher.
Yes, you can find more information about CVE-2023-32678 in the Zulip Server 7.3 changelog and the associated GitHub security advisory.