CVE-2024-29891

ZITADEL users can upload their own avatar image and various image types are allowed. Due to a missing check, an attacker could upload HTML and pretend it is an image to gain access to the victim's account in certain scenarios. A possible victim would need to directly open the supposed image in the browser, where a session in ZITADEL needs to be active for this exploit to work. The exploit could only be reproduced if the victim was using Firefox. Chrome, Safari as well as Edge did not execute the code. This vulnerability is fixed in 2.48.3, 2.47.8, 2.46.5, 2.45.5, 2.44.7, 2.43.11, and 2.42.17.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*
cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*
cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*
cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*
cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*
cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*
cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*

History

08 Jan 2025, 18:16

Type Values Removed Values Added
CWE CWE-79
First Time Zitadel zitadel
Zitadel
CPE cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*
References () https://github.com/zitadel/zitadel/releases/tag/v2.42.17 - () https://github.com/zitadel/zitadel/releases/tag/v2.42.17 - Release Notes
References () https://github.com/zitadel/zitadel/releases/tag/v2.43.11 - () https://github.com/zitadel/zitadel/releases/tag/v2.43.11 - Release Notes
References () https://github.com/zitadel/zitadel/releases/tag/v2.44.7 - () https://github.com/zitadel/zitadel/releases/tag/v2.44.7 - Release Notes
References () https://github.com/zitadel/zitadel/releases/tag/v2.45.5 - () https://github.com/zitadel/zitadel/releases/tag/v2.45.5 - Release Notes
References () https://github.com/zitadel/zitadel/releases/tag/v2.46.5 - () https://github.com/zitadel/zitadel/releases/tag/v2.46.5 - Release Notes
References () https://github.com/zitadel/zitadel/releases/tag/v2.47.8 - () https://github.com/zitadel/zitadel/releases/tag/v2.47.8 - Release Notes
References () https://github.com/zitadel/zitadel/releases/tag/v2.48.3 - () https://github.com/zitadel/zitadel/releases/tag/v2.48.3 - Release Notes
References () https://github.com/zitadel/zitadel/security/advisories/GHSA-hr5w-cwwq-2v4m - () https://github.com/zitadel/zitadel/security/advisories/GHSA-hr5w-cwwq-2v4m - Vendor Advisory

21 Nov 2024, 09:08

Type Values Removed Values Added
References () https://github.com/zitadel/zitadel/releases/tag/v2.42.17 - () https://github.com/zitadel/zitadel/releases/tag/v2.42.17 -
References () https://github.com/zitadel/zitadel/releases/tag/v2.43.11 - () https://github.com/zitadel/zitadel/releases/tag/v2.43.11 -
References () https://github.com/zitadel/zitadel/releases/tag/v2.44.7 - () https://github.com/zitadel/zitadel/releases/tag/v2.44.7 -
References () https://github.com/zitadel/zitadel/releases/tag/v2.45.5 - () https://github.com/zitadel/zitadel/releases/tag/v2.45.5 -
References () https://github.com/zitadel/zitadel/releases/tag/v2.46.5 - () https://github.com/zitadel/zitadel/releases/tag/v2.46.5 -
References () https://github.com/zitadel/zitadel/releases/tag/v2.47.8 - () https://github.com/zitadel/zitadel/releases/tag/v2.47.8 -
References () https://github.com/zitadel/zitadel/releases/tag/v2.48.3 - () https://github.com/zitadel/zitadel/releases/tag/v2.48.3 -
References () https://github.com/zitadel/zitadel/security/advisories/GHSA-hr5w-cwwq-2v4m - () https://github.com/zitadel/zitadel/security/advisories/GHSA-hr5w-cwwq-2v4m -

27 Mar 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-27 20:15

Updated : 2025-01-08 18:16


NVD link : CVE-2024-29891

Mitre link : CVE-2024-29891

CVE.ORG link : CVE-2024-29891


JSON object : View

Products Affected

zitadel

  • zitadel
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type

CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')