Skip to main content

CVE-2022-35962: CWE-184: Incomplete List of Disallowed Inputs in zulip zulip-mobile

Medium
Published: Mon Aug 29 2022 (08/29/2022, 14:50:09 UTC)
Source: CVE
Vendor/Project: zulip
Product: zulip-mobile

Description

Zulip is an open source team chat and Zulip Mobile is an app for iOS and Andriod users. In Zulip Mobile through version 27.189, a crafted link in a message sent by an authenticated user could lead to credential disclosure if a user follows the link. A patch was released in version 27.190.

AI-Powered Analysis

AILast updated: 06/22/2025, 23:49:58 UTC

Technical Analysis

CVE-2022-35962 is a medium-severity vulnerability affecting Zulip Mobile, an open-source team chat application available on iOS and Android platforms. The vulnerability arises due to an incomplete list of disallowed inputs (CWE-184) and interpretation conflicts (CWE-436) in the handling of crafted links within messages. Specifically, in versions of Zulip Mobile prior to 27.190, an authenticated user can send a specially crafted link in a chat message. If another user clicks on this malicious link, it can lead to the disclosure of credentials. This occurs because the application does not properly sanitize or restrict certain inputs, allowing the crafted link to exploit the app's interpretation logic and bypass security controls. The vulnerability requires the attacker to be an authenticated user who can send messages, and the victim must interact by clicking the malicious link. The issue was addressed and patched in version 27.190 of Zulip Mobile. There are no known exploits in the wild reported to date. The vulnerability impacts confidentiality primarily, as it can lead to credential disclosure, potentially compromising user accounts and access to the Zulip chat environment. The integrity and availability impacts are less direct but could follow from compromised credentials. The vulnerability affects both iOS and Android users of Zulip Mobile prior to the patched version.

Potential Impact

For European organizations using Zulip Mobile for internal communications, this vulnerability poses a risk of credential theft, which can lead to unauthorized access to sensitive corporate communications and data. Given that Zulip is an open-source platform often used by tech-savvy teams and organizations valuing open-source solutions, the impact could be significant in sectors such as technology, finance, and government agencies that rely on secure team collaboration tools. Credential disclosure can facilitate lateral movement within networks, data exfiltration, and espionage. The requirement for user interaction (clicking a malicious link) means that social engineering or phishing tactics could be employed by attackers. Although no exploits are known in the wild, the presence of this vulnerability in widely used mobile apps increases the attack surface, especially as mobile devices are often less protected than desktops. The impact is heightened in environments where multi-factor authentication is not enforced or where users reuse passwords across services. The vulnerability could also undermine trust in the communication platform, affecting organizational productivity and security posture.

Mitigation Recommendations

1. Immediate upgrade: Organizations should ensure all Zulip Mobile clients are updated to version 27.190 or later to apply the official patch addressing this vulnerability. 2. User education: Train users to be cautious about clicking links in messages, even from authenticated users, emphasizing verification of unexpected or suspicious links. 3. Implement multi-factor authentication (MFA): Enforce MFA on Zulip accounts to reduce the risk of credential misuse if disclosure occurs. 4. Network monitoring: Deploy monitoring for unusual access patterns or login attempts that could indicate compromised credentials. 5. Application whitelisting and sandboxing: On managed mobile devices, restrict installation of unauthorized apps and isolate Zulip Mobile to limit potential damage. 6. Link scanning: Integrate URL scanning solutions or proxies that can detect and block malicious links before they reach end users. 7. Incident response readiness: Prepare to respond to potential credential compromise incidents by having procedures for rapid password resets and account lockouts. 8. Encourage use of password managers to avoid password reuse and improve credential hygiene.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-07-15T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9844c4522896dcbf3b5d

Added to database: 5/21/2025, 9:09:24 AM

Last enriched: 6/22/2025, 11:49:58 PM

Last updated: 7/31/2025, 1:41:21 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats