CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
AI Score
Confidence
High
SSVC
Exploitation
none
Automatable
no
Technical Impact
total
ZITADEL, open source authentication management software, uses Go templates to render the login UI. Under certain circumstances an action could set reserved claims managed by ZITADEL. For example it would be possible to set the claim urn:zitadel:iam:user:resourceowner:name
. To compensate for this we introduced a protection that does prevent actions from changing claims that start with urn:zitadel:iam
. This vulnerability is fixed in 2.48.3, 2.47.8, 2.46.5, 2.45.5, 2.44.7, 2.43.11, and 2.42.17.
[
{
"cpes": [
"cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*"
],
"vendor": "zitadel",
"product": "zitadel",
"versions": [
{
"status": "affected",
"version": "0",
"lessThan": "2.42.17",
"versionType": "custom"
},
{
"status": "affected",
"version": "2.43.0",
"lessThan": "2.43.11",
"versionType": "custom"
},
{
"status": "affected",
"version": "2.44.0",
"lessThan": "2.44.7",
"versionType": "custom"
},
{
"status": "affected",
"version": "2.45.0",
"lessThan": "2.45.5",
"versionType": "custom"
},
{
"status": "affected",
"version": "2.46.0",
"lessThan": "2.46.5",
"versionType": "custom"
},
{
"status": "affected",
"version": "2.47.0",
"lessThan": "2.47.8",
"versionType": "custom"
},
{
"status": "affected",
"version": "2.48.0",
"lessThan": "2.48.3",
"versionType": "custom"
}
],
"defaultStatus": "unknown"
}
]
github.com/zitadel/zitadel/releases/tag/v2.42.17
github.com/zitadel/zitadel/releases/tag/v2.43.11
github.com/zitadel/zitadel/releases/tag/v2.44.7
github.com/zitadel/zitadel/releases/tag/v2.45.5
github.com/zitadel/zitadel/releases/tag/v2.46.5
github.com/zitadel/zitadel/releases/tag/v2.47.8
github.com/zitadel/zitadel/releases/tag/v2.48.3
github.com/zitadel/zitadel/security/advisories/GHSA-gp8g-f42f-95q2
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
AI Score
Confidence
High
SSVC
Exploitation
none
Automatable
no
Technical Impact
total