Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-44399
HistoryOct 10, 2023 - 4:55 p.m.

CVE-2023-44399 ZITADEL's password reset does not respect the "Ignoring unknown usernames" setting

2023-10-1016:55:45
CWE-640
GitHub_M
www.cve.org
3
zitadel
password reset
bug
account verification
security issue
patch

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

EPSS

0.001

Percentile

24.2%

ZITADEL provides identity infrastructure. In versions 2.37.2 and prior, ZITADEL administrators can enable a setting called “Ignoring unknown usernames” which helps mitigate attacks that try to guess/enumerate usernames. While this settings was properly working during the authentication process it did not work correctly on the password reset flow. This meant that even if this feature was active that an attacker could use the password reset function to verify if an account exist within ZITADEL. This bug has been patched in versions 2.37.3 and 2.38.0. No known workarounds are available.

CNA Affected

[
  {
    "vendor": "zitadel",
    "product": "zitadel",
    "versions": [
      {
        "version": "< 2.37.3",
        "status": "affected"
      }
    ]
  }
]

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

EPSS

0.001

Percentile

24.2%

Related for CVELIST:CVE-2023-44399