Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-29892
HistoryMar 27, 2024 - 7:59 p.m.

CVE-2024-29892 ZITADEL's actions can overload reserved claims

2024-03-2719:59:24
CWE-863
GitHub_M
github.com
1
zitadel
authentication management
go templates
reserved claims
vulnerability
fixed
version 2.48.3
version 2.47.8
version 2.46.5
version 2.45.5
version 2.44.7
version 2.43.11
version 2.42.17

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N

AI Score

6.7

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

ZITADEL, open source authentication management software, uses Go templates to render the login UI. Under certain circumstances an action could set reserved claims managed by ZITADEL. For example it would be possible to set the claim urn:zitadel:iam:user:resourceowner:name. To compensate for this we introduced a protection that does prevent actions from changing claims that start with urn:zitadel:iam. This vulnerability is fixed in 2.48.3, 2.47.8, 2.46.5, 2.45.5, 2.44.7, 2.43.11, and 2.42.17.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*"
    ],
    "vendor": "zitadel",
    "product": "zitadel",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "2.42.17",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "2.43.0",
        "lessThan": "2.43.11",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "2.44.0",
        "lessThan": "2.44.7",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "2.45.0",
        "lessThan": "2.45.5",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "2.46.0",
        "lessThan": "2.46.5",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "2.47.0",
        "lessThan": "2.47.8",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "2.48.0",
        "lessThan": "2.48.3",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N

AI Score

6.7

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-29892