Zulip Server 1.5.1 and below suffer from an error in the implementation of the invite_by_admins_only setting in the Zulip group chat application server that allowed an authenticated user to invite other users to join a Zulip organization even if the organization was configured to prevent this.
The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Zulip_server | Zulip | 1.3.0 (including) | 1.3.0 (including) |
Zulip_server | Zulip | 1.3.1 (including) | 1.3.1 (including) |
Zulip_server | Zulip | 1.3.2 (including) | 1.3.2 (including) |
Zulip_server | Zulip | 1.3.3 (including) | 1.3.3 (including) |
Zulip_server | Zulip | 1.3.4 (including) | 1.3.4 (including) |
Zulip_server | Zulip | 1.3.6 (including) | 1.3.6 (including) |
Zulip_server | Zulip | 1.3.7 (including) | 1.3.7 (including) |
Zulip_server | Zulip | 1.3.8 (including) | 1.3.8 (including) |
Zulip_server | Zulip | 1.3.9 (including) | 1.3.9 (including) |
Zulip_server | Zulip | 1.3.10 (including) | 1.3.10 (including) |
Zulip_server | Zulip | 1.3.11 (including) | 1.3.11 (including) |
Zulip_server | Zulip | 1.3.12 (including) | 1.3.12 (including) |
Zulip_server | Zulip | 1.3.13 (including) | 1.3.13 (including) |
Zulip_server | Zulip | 1.4.0 (including) | 1.4.0 (including) |
Zulip_server | Zulip | 1.4.1 (including) | 1.4.1 (including) |
Zulip_server | Zulip | 1.4.2 (including) | 1.4.2 (including) |
Zulip_server | Zulip | 1.4.3 (including) | 1.4.3 (including) |
Zulip_server | Zulip | 1.5.0 (including) | 1.5.0 (including) |
Zulip_server | Zulip | 1.5.1 (including) | 1.5.1 (including) |
Assuming a user with a given identity, authorization is the process of determining whether that user can access a given resource, based on the user’s privileges and any permissions or other access-control specifications that apply to the resource. When access control checks are not applied consistently - or not at all - users are able to access data or perform actions that they should not be allowed to perform. This can lead to a wide range of problems, including information exposures, denial of service, and arbitrary code execution.