Vulnerability Report: GO-2024-2665
- CVE-2024-29891, GHSA-hr5w-cwwq-2v4m
- Affects: github.com/zitadel/zitadel
- Published: Jun 05, 2024
- Modified: Jul 09, 2024
- Unreviewed
ZITADEL's Improper Content-Type Validation Leads to Account Takeover via Stored XSS + CSP Bypass in github.com/zitadel/zitadel. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/zitadel/zitadel before v2.42.17, from v2.43.0 before v2.43.11, from v2.44.0 before v2.44.7, from v2.45.0 before v2.45.5, from v2.46.0 before v2.46.5, from v2.47.0 before v2.47.8, from v2.48.0 before v2.48.3.
For detailed information about this vulnerability, visit https://github.com/zitadel/zitadel/security/advisories/GHSA-hr5w-cwwq-2v4m or https://nvd.nist.gov/vuln/detail/CVE-2024-29891.
Affected Modules
-
PathGo VersionsCustom Versions*
-
all versions, no known fixedbefore 2.42.17, from 2.43.0 before 2.43.11, from 2.44.0 before 2.44.7, from 2.45.0 before 2.45.5, from 2.46.0 before 2.46.5, from 2.47.0 before 2.47.8, from 2.48.0 before 2.48.3
*Custom versions, which can't be mapped automatically to standard Go module versions, are ignored by govulncheck
. (See this note on versions for more details.)
Aliases
References
- https://github.com/zitadel/zitadel/security/advisories/GHSA-hr5w-cwwq-2v4m
- https://nvd.nist.gov/vuln/detail/CVE-2024-29891
- https://github.com/zitadel/zitadel/releases/tag/v2.42.17
- https://github.com/zitadel/zitadel/releases/tag/v2.43.11
- https://github.com/zitadel/zitadel/releases/tag/v2.44.7
- https://github.com/zitadel/zitadel/releases/tag/v2.45.5
- https://github.com/zitadel/zitadel/releases/tag/v2.46.5
- https://github.com/zitadel/zitadel/releases/tag/v2.47.8
- https://github.com/zitadel/zitadel/releases/tag/v2.48.3
- https://vuln.go.dev/ID/GO-2024-2665.json