CVE-2024-29891
27.03.2024, 20:15
ZITADEL users can upload their own avatar image and various image types are allowed. Due to a missing check, an attacker could upload HTML and pretend it is an image to gain access to the victim's account in certain scenarios. A possible victim would need to directly open the supposed image in the browser, where a session in ZITADEL needs to be active for this exploit to work. The exploit could only be reproduced if the victim was using Firefox. Chrome, Safari as well as Edge did not execute the code. This vulnerability is fixed in 2.48.3, 2.47.8, 2.46.5, 2.45.5, 2.44.7, 2.43.11, and 2.42.17.
Vendor | Product | Version |
---|---|---|
zitadel | zitadel | 𝑥 < 2.42.17 |
zitadel | zitadel | 2.43.0 ≤ 𝑥 < 2.43.11 |
zitadel | zitadel | 2.44.0 ≤ 𝑥 < 2.44.7 |
zitadel | zitadel | 2.45.0 ≤ 𝑥 < 2.45.5 |
zitadel | zitadel | 2.46.0 ≤ 𝑥 < 2.46.5 |
zitadel | zitadel | 2.47.0 ≤ 𝑥 < 2.47.8 |
zitadel | zitadel | 2.48.0 ≤ 𝑥 < 2.48.3 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-434 - Unrestricted Upload of File with Dangerous TypeThe software allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment.
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
References