Lucene search

K
cve[email protected]CVE-2024-28855
HistoryMar 18, 2024 - 10:15 p.m.

CVE-2024-28855

2024-03-1822:15:08
CWE-20
web.nvd.nist.gov
44
zitadel
authentication
management
software
cve-2024-28855
security
vulnerability
go templates
input sanitization
patch

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

8.1 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

13.0%

ZITADEL, open source authentication management software, uses Go templates to render the login UI. Due to a improper use of the text/template instead of the html/template package, the Login UI did not sanitize input parameters prior to versions 2.47.3, 2.46.1, 2.45.1, 2.44.3, 2.43.9, 2.42.15, and 2.41.15. An attacker could create a malicious link, where he injected code which would be rendered as part of the login screen. While it was possible to inject HTML including JavaScript, the execution of such scripts would be prevented by the Content Security Policy. Versions 2.47.3, 2.46.1, 2.45.1, 2.44.3, 2.43.9, 2.42.15, and 2.41.15 contain a patch for this issue. No known workarounds are available.

Affected configurations

Vulners
Node
zitadelzitadelRange<2.41.15
OR
zitadelzitadelRange2.42.02.42.15
OR
zitadelzitadelRange2.43.02.43.9
OR
zitadelzitadelRange2.44.02.44.3
OR
zitadelzitadelMatch2.45.0
OR
zitadelzitadelMatch2.46.0
OR
zitadelzitadelRange2.47.02.47.4
VendorProductVersionCPE
zitadelzitadel*cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*
zitadelzitadel*cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*
zitadelzitadel*cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*
zitadelzitadel*cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*
zitadelzitadel2.45.0cpe:2.3:a:zitadel:zitadel:2.45.0:*:*:*:*:*:*:*
zitadelzitadel2.46.0cpe:2.3:a:zitadel:zitadel:2.46.0:*:*:*:*:*:*:*
zitadelzitadel*cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "zitadel",
    "product": "zitadel",
    "versions": [
      {
        "version": "< 2.41.15",
        "status": "affected"
      },
      {
        "version": ">= 2.42.0, < 2.42.15",
        "status": "affected"
      },
      {
        "version": ">= 2.43.0, < 2.43.9",
        "status": "affected"
      },
      {
        "version": ">= 2.44.0, < 2.44.3",
        "status": "affected"
      },
      {
        "version": "= 2.45.0",
        "status": "affected"
      },
      {
        "version": "= 2.46.0",
        "status": "affected"
      },
      {
        "version": ">= 2.47.0, < 2.47.4",
        "status": "affected"
      }
    ]
  }
]

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

8.1 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

13.0%

Related for CVE-2024-28855