Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7j7j-66cv-m239

Опубликовано: 25 апр. 2024
Источник: github
Github: Прошло ревью
CVSS4: 7.1
CVSS3: 6.5

Описание

ZITADEL's Improper Lockout Mechanism Leads to MFA Bypass

Impact

ZITADEL provides users the possibility to use Time-based One-Time-Password (TOTP) and One-Time-Password (OTP) through SMS and Email.

While ZITADEL already gives administrators the option to define a Lockout Policy with a maximum amount of failed password check attempts, there was no such mechanism for (T)OTP checks.

Patches

2.x versions are fixed on >= 2.50.0

Workarounds

There is no workaround since a patch is already available.

References

None

Questions

If you have any questions or comments about this advisory, please email us at security@zitadel.com

Credits

Thanks to Jack Moran from Layer 9 Information Security, Ethan from zxsecurity and Amit Laish from GE Vernova for finding and reporting the vulnerability.

Пакеты

Наименование

github.com/zitadel/zitadel

go
Затронутые версииВерсия исправления

< 2.50.0

2.50.0

EPSS

Процентиль: 35%
0.00141
Низкий

7.1 High

CVSS4

6.5 Medium

CVSS3

Дефекты

CWE-287
CWE-297
CWE-307

Связанные уязвимости

CVSS3: 6.5
nvd
почти 2 года назад

ZITADEL provides users the possibility to use Time-based One-Time-Password (TOTP) and One-Time-Password (OTP) through SMS and Email. While ZITADEL already gives administrators the option to define a `Lockout Policy` with a maximum amount of failed password check attempts, there was no such mechanism for (T)OTP checks. This issue has been patched in version 2.50.0.

EPSS

Процентиль: 35%
0.00141
Низкий

7.1 High

CVSS4

6.5 Medium

CVSS3

Дефекты

CWE-287
CWE-297
CWE-307