CVE-2019-16216

Source
https://nvd.nist.gov/vuln/detail/CVE-2019-16216
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-16216.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2019-16216
Published
2019-09-18T12:15:10Z
Modified
2025-01-15T01:39:54.141879Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Zulip server before 2.0.5 incompletely validated the MIME types of uploaded files. A user who is logged into the server could upload files of certain types to mount a stored cross-site scripting attack on other logged-in users. On a Zulip server using the default local uploads backend, the attack is only effective against browsers lacking support for Content-Security-Policy such as Internet Explorer 11. On a Zulip server using the S3 uploads backend, the attack is confined to the origin of the configured S3 uploads hostname and cannot reach the Zulip server itself.

References

Affected packages

Git / github.com/zulip/zulip

Affected ranges

Type
GIT
Repo
https://github.com/zulip/zulip
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

1.*

1.3.0
1.3.1
1.3.10
1.3.11
1.3.12
1.3.13
1.3.2
1.3.3
1.3.4
1.3.5
1.3.6
1.3.7
1.3.8
1.3.9
1.4.0
1.5.0
1.6.0
1.7.0
1.8.0
1.8.0-rc1
1.9.0
1.9.0-rc2
1.9.0-rc3

2.*

2.0.0
2.0.0-rc1
2.0.1
2.0.2
2.0.3
2.0.4

enterprise-1.*

enterprise-1.1.5
enterprise-1.2.0