Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-32967
HistoryMay 01, 2024 - 6:43 a.m.

CVE-2024-32967 Zitadel exposes internal database user name and host information

2024-05-0106:43:36
CWE-200
GitHub_M
github.com
1
zitadel
vulnerability
database security

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

6.5

Confidence

High

EPSS

0

Percentile

13.0%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

Zitadel is an open source identity management system. In case ZITADEL could not connect to the database, connection information including db name, username and db host name could be returned to the user. This has been addressed in all supported release branches in a point release. There is no workaround since a patch is already available. Users are advised to upgrade.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*"
    ],
    "vendor": "zitadel",
    "product": "zitadel",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "2.45.7",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "2.46.0",
        "lessThan": "2.46.7",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "2.47.0",
        "lessThan": "2.47.10",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "2.48.0",
        "lessThan": "2.48.5",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "2.49.0",
        "lessThan": "2.49.5",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "2.50.0",
        "lessThan": "2.50.3",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

6.5

Confidence

High

EPSS

0

Percentile

13.0%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-32967