Vulnerability Report: GO-2024-3138
- CVE-2024-47060, GHSA-jj94-6f5c-65r8
- Affects: github.com/zitadel/zitadel
- Published: Sep 26, 2024
- Unreviewed
ZITADEL Allows Unauthorized Access After Organization or Project Deactivation in github.com/zitadel/zitadel. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/zitadel/zitadel before v2.54.10, from v2.55.0 before v2.55.8, from v2.56.0 before v2.56.6, from v2.57.0 before v2.57.5, from v2.58.0 before v2.58.5, from v2.59.0 before v2.59.3, from v2.60.0 before v2.60.2, from v2.61.0 before v2.61.1, from v2.62.0 before v2.62.1.
For detailed information about this vulnerability, visit https://github.com/zitadel/zitadel/security/advisories/GHSA-jj94-6f5c-65r8 or https://nvd.nist.gov/vuln/detail/CVE-2024-47060.
Affected Modules
-
PathGo VersionsCustom Versions*
-
all versions, no known fixedbefore 2.54.10, from 2.55.0 before 2.55.8, from 2.56.0 before 2.56.6, from 2.57.0 before 2.57.5, from 2.58.0 before 2.58.5, from 2.59.0 before 2.59.3, from 2.60.0 before 2.60.2, from 2.61.0 before 2.61.1, from 2.62.0 before 2.62.1
*Custom versions, which can't be mapped automatically to standard Go module versions, are ignored by govulncheck
. (See this note on versions for more details.)
Aliases
References
- https://github.com/zitadel/zitadel/security/advisories/GHSA-jj94-6f5c-65r8
- https://nvd.nist.gov/vuln/detail/CVE-2024-47060
- https://vuln.go.dev/ID/GO-2024-3138.json