cve/2024/CVE-2024-29892.md
2024-05-25 21:48:12 +02:00

18 lines
1018 B
Markdown

### [CVE-2024-29892](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29892)
![](https://img.shields.io/static/v1?label=Product&message=zitadel&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%202.42.17%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-863%3A%20Incorrect%20Authorization&color=brighgreen)
### Description
ZITADEL, open source authentication management software, uses Go templates to render the login UI. Under certain circumstances an action could set reserved claims managed by ZITADEL. For example it would be possible to set the claim `urn:zitadel:iam:user:resourceowner:name`. To compensate for this we introduced a protection that does prevent actions from changing claims that start with `urn:zitadel:iam`. This vulnerability is fixed in 2.48.3, 2.47.8, 2.46.5, 2.45.5, 2.44.7, 2.43.11, and 2.42.17.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds