Affected by GO-2024-2637
and 7 other vulnerabilities
GO-2024-2637: Account Takeover via Session Fixation in Zitadel [Bypassing MFA] in github.com/zitadel/zitadel
GO-2024-2664: ZITADEL's actions can overload reserved claims in github.com/zitadel/zitadel
GO-2024-2665: ZITADEL's Improper Content-Type Validation Leads to Account Takeover via Stored XSS + CSP Bypass in github.com/zitadel/zitadel
GO-2024-2788: ZITADEL's Improper Lockout Mechanism Leads to MFA Bypass in github.com/zitadel/zitadel
GO-2024-2804: Zitadel exposing internal database user name and host information in github.com/zitadel/zitadel
GO-2024-2968: ZITADEL Vulnerable to Session Information Leakage in github.com/zitadel/zitadel
GO-2024-3014: ZITADEL "ignoring unknown usernames" vulnerability in github.com/zitadel/zitadel
GO-2024-3015: ZITADEL has improper HTML sanitization in emails and Console UI in github.com/zitadel/zitadel
package
Version:
v1.87.5
Opens a new window with list of versions in this module.
Published: Dec 20, 2022
License: Apache-2.0
Opens a new window with license information.
Imports: 14
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Documentation
¶
func AdaptFunc(
monitor mntr.Monitor,
componentLabels *labels.Component,
namespace string,
reason string,
nodeselector map[string]string,
tolerations []corev1.Toleration,
resources *k8s.Resources,
version *string,
cmName string,
certPath string,
secretName string,
secretPath string,
consoleCMName string,
secretVarsName string,
secretPasswordsName string,
customImageRegistry string,
dbConn db.Connection,
) (
func(
necessaryUsers map[string]string,
getConfigurationHashes func(k8sClient kubernetes.ClientInt, queried map[string]interface{}, necessaryUsers map[string]string) (map[string]string, error),
) operator.QueryFunc,
operator.DestroyFunc,
error,
)
Source Files
¶
Click to show internal directories.
Click to hide internal directories.