Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-39683
HistoryJul 03, 2024 - 7:20 p.m.

CVE-2024-39683 ZITADEL Vulnerable to Session Information Leakage

2024-07-0319:20:08
CWE-200
GitHub_M
github.com
2
zitadel
vulnerable
session information leakage
cve-2024-39683
user sessions

CVSS3

5.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N

AI Score

6.6

Confidence

High

SSVC

Exploitation

poc

Automatable

no

Technical Impact

partial

ZITADEL is an open-source identity infrastructure tool. ZITADEL provides users the ability to list all user sessions of the current user agent (browser). Starting in version 2.53.0 and prior to versions 2.53.8, 2.54.5, and 2.55.1, due to a missing check, user sessions without that information (e.g. when created though the session service) were incorrectly listed exposing potentially other user’s sessions. Versions 2.55.1, 2.54.5, and 2.53.8 contain a fix for the issue. There is no workaround since a patch is already available.

CNA Affected

[
  {
    "vendor": "zitadel",
    "product": "zitadel",
    "versions": [
      {
        "status": "affected",
        "version": "= 2.55.0"
      },
      {
        "status": "affected",
        "version": ">= 2.54.0, < 2.54.5"
      },
      {
        "status": "affected",
        "version": ">= 2.53.0, < 2.53.8"
      }
    ]
  }
]

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*"
    ],
    "vendor": "zitadel",
    "product": "zitadel",
    "versions": [
      {
        "status": "affected",
        "version": "2.54.0",
        "lessThan": "2.54.5",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "2.55.0"
      },
      {
        "status": "affected",
        "version": "2.53.0",
        "lessThan": "2.53.8",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

5.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N

AI Score

6.6

Confidence

High

SSVC

Exploitation

poc

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-39683