Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-v683-rcxx-vpff

Опубликовано: 10 окт. 2023
Источник: github
Github: Прошло ревью
CVSS3: 5.3

Описание

ZITADEL's password reset does not respect the "Ignoring unknown usernames" setting

Impact

ZITADEL administrators can enable a setting called "Ignoring unknown usernames" which helps mitigate attacks that try to guess/enumerate usernames. While this settings was properly working during the authentication process it did not work correctly on the password reset flow. This meant that even if this feature was active that an attacker could use the password reset function to verify if an account exist within ZITADEL.

Patches

This bug has been patched in versions >2.27.2 beginning with 2.37.3 and 2.38.0

Workarounds

None available we advise to updated if this is needed.

References

None

Пакеты

Наименование

github.com/zitadel/zitadel

go
Затронутые версииВерсия исправления

< 2.37.3

2.37.3

EPSS

Процентиль: 57%
0.00352
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-640

Связанные уязвимости

CVSS3: 5.3
nvd
больше 2 лет назад

ZITADEL provides identity infrastructure. In versions 2.37.2 and prior, ZITADEL administrators can enable a setting called "Ignoring unknown usernames" which helps mitigate attacks that try to guess/enumerate usernames. While this settings was properly working during the authentication process it did not work correctly on the password reset flow. This meant that even if this feature was active that an attacker could use the password reset function to verify if an account exist within ZITADEL. This bug has been patched in versions 2.37.3 and 2.38.0. No known workarounds are available.

EPSS

Процентиль: 57%
0.00352
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-640