Vulnerability Report: GO-2024-3139

ZITADEL's Service Users Deactivation not Working in github.com/zitadel/zitadel. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/zitadel/zitadel before v2.54.10, from v2.55.0 before v2.55.8, from v2.56.0 before v2.56.6, from v2.57.0 before v2.57.5, from v2.58.0 before v2.58.5, from v2.59.0 before v2.59.3, from v2.60.0 before v2.60.2, from v2.61.0 before v2.61.1, from v2.62.0 before v2.62.1.

For detailed information about this vulnerability, visit https://github.com/zitadel/zitadel/security/advisories/GHSA-qr2h-7pwm-h393 or https://nvd.nist.gov/vuln/detail/CVE-2024-47000.

Affected Modules

  • Path
    Go Versions
    Custom Versions*
  • all versions, no known fixed
    before 2.54.10, from 2.55.0 before 2.55.8, from 2.56.0 before 2.56.6, from 2.57.0 before 2.57.5, from 2.58.0 before 2.58.5, from 2.59.0 before 2.59.3, from 2.60.0 before 2.60.2, from 2.61.0 before 2.61.1, from 2.62.0 before 2.62.1

*Custom versions, which can't be mapped automatically to standard Go module versions, are ignored by govulncheck. (See this note on versions for more details.)

Aliases

References

Feedback

This report is unreviewed. It was automatically generated from a third-party source and its details have not been verified by the Go team.
See anything missing or incorrect? Suggest an edit to this report.

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL