Lucene search

K
cveGitHub_MCVE-2024-29892
HistoryMar 27, 2024 - 8:15 p.m.

CVE-2024-29892

2024-03-2720:15:08
CWE-863
GitHub_M
web.nvd.nist.gov
39
zitadel
authentication management
open source
go templates
vulnerability
fixed versions
nvd

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N

AI Score

6.1

Confidence

High

EPSS

0

Percentile

13.0%

ZITADEL, open source authentication management software, uses Go templates to render the login UI. Under certain circumstances an action could set reserved claims managed by ZITADEL. For example it would be possible to set the claim urn:zitadel:iam:user:resourceowner:name. To compensate for this we introduced a protection that does prevent actions from changing claims that start with urn:zitadel:iam. This vulnerability is fixed in 2.48.3, 2.47.8, 2.46.5, 2.45.5, 2.44.7, 2.43.11, and 2.42.17.

Affected configurations

Vulners
Vulnrichment
Node
zitadelzitadelRange<2.42.17
OR
zitadelzitadelRange2.43.02.43.11
OR
zitadelzitadelRange2.44.02.44.7
OR
zitadelzitadelRange2.45.02.45.5
OR
zitadelzitadelRange2.46.02.46.5
OR
zitadelzitadelRange2.47.02.47.8
OR
zitadelzitadelRange2.48.02.48.3
VendorProductVersionCPE
zitadelzitadel*cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "zitadel",
    "product": "zitadel",
    "versions": [
      {
        "version": "< 2.42.17",
        "status": "affected"
      },
      {
        "version": ">= 2.43.0, < 2.43.11",
        "status": "affected"
      },
      {
        "version": ">= 2.44.0, < 2.44.7",
        "status": "affected"
      },
      {
        "version": ">= 2.45.0, < 2.45.5",
        "status": "affected"
      },
      {
        "version": ">= 2.46.0, < 2.46.5",
        "status": "affected"
      },
      {
        "version": ">= 2.47.0, < 2.47.8",
        "status": "affected"
      },
      {
        "version": ">= 2.48.0, < 2.48.3",
        "status": "affected"
      }
    ]
  }
]

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N

AI Score

6.1

Confidence

High

EPSS

0

Percentile

13.0%