Логотип exploitDog
bind:CVE-2024-29891
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-29891

Количество 2

Количество 2

nvd логотип

CVE-2024-29891

почти 2 года назад

ZITADEL users can upload their own avatar image and various image types are allowed. Due to a missing check, an attacker could upload HTML and pretend it is an image to gain access to the victim's account in certain scenarios. A possible victim would need to directly open the supposed image in the browser, where a session in ZITADEL needs to be active for this exploit to work. The exploit could only be reproduced if the victim was using Firefox. Chrome, Safari as well as Edge did not execute the code. This vulnerability is fixed in 2.48.3, 2.47.8, 2.46.5, 2.45.5, 2.44.7, 2.43.11, and 2.42.17.

CVSS3: 8.7
EPSS: Низкий
github логотип

GHSA-hr5w-cwwq-2v4m

почти 2 года назад

ZITADEL's Improper Content-Type Validation Leads to Account Takeover via Stored XSS + CSP Bypass

CVSS3: 8.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-29891

ZITADEL users can upload their own avatar image and various image types are allowed. Due to a missing check, an attacker could upload HTML and pretend it is an image to gain access to the victim's account in certain scenarios. A possible victim would need to directly open the supposed image in the browser, where a session in ZITADEL needs to be active for this exploit to work. The exploit could only be reproduced if the victim was using Firefox. Chrome, Safari as well as Edge did not execute the code. This vulnerability is fixed in 2.48.3, 2.47.8, 2.46.5, 2.45.5, 2.44.7, 2.43.11, and 2.42.17.

CVSS3: 8.7
1%
Низкий
почти 2 года назад
github логотип
GHSA-hr5w-cwwq-2v4m

ZITADEL's Improper Content-Type Validation Leads to Account Takeover via Stored XSS + CSP Bypass

CVSS3: 8.7
1%
Низкий
почти 2 года назад

Уязвимостей на страницу