CVE-2024-46999 (GCVE-0-2024-46999)
Vulnerability from cvelistv5
Published
2024-09-19 23:11
Modified
2024-09-20 15:44
CWE
  • CWE-269 - Improper Privilege Management
Summary
Zitadel is an open source identity management platform. ZITADEL's user grants deactivation mechanism did not work correctly. Deactivated user grants were still provided in token, which could lead to unauthorized access to applications and resources. Additionally, the management and auth API always returned the state as active or did not provide any information about the state. Versions 2.62.1, 2.61.1, 2.60.2, 2.59.3, 2.58.5, 2.57.5, 2.56.6, 2.55.8, and 2.54.10 have been released which address this issue. Users are advised to upgrade. Users unable to upgrade may explicitly remove the user grants to make sure the user does not get access anymore.
Impacted products
Vendor Product Version
zitadel zitadel Version: >= 2.62.0, < 2.62.1
Version: >= 2.61.0, < 2.61.1
Version: >= 2.60.0, < 2.60.2
Version: >= 2.59.0, < 2.59.3
Version: >= 2.58.0, < 2.58.5
Version: >= 2.57.0, < 2.57.5
Version: >= 2.56.0, < 2.56.6
Version: >= 2.55.0, < 2.55.8
Version: < 2.54.10
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "zitadel",
            "vendor": "zitadel",
            "versions": [
              {
                "lessThan": "2.54.10",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              },
              {
                "lessThan": "2.55.8",
                "status": "affected",
                "version": "2.55.0",
                "versionType": "custom"
              },
              {
                "lessThan": "2.56.6",
                "status": "affected",
                "version": "2.56.0",
                "versionType": "custom"
              },
              {
                "lessThan": "2.57.5",
                "status": "affected",
                "version": "2.57.0",
                "versionType": "custom"
              },
              {
                "lessThan": "2.58.5",
                "status": "affected",
                "version": "2.58.0",
                "versionType": "custom"
              },
              {
                "lessThan": "2.59.3",
                "status": "affected",
                "version": "2.59.0",
                "versionType": "custom"
              },
              {
                "lessThan": "2.60.2",
                "status": "affected",
                "version": "2.60.0",
                "versionType": "custom"
              },
              {
                "lessThan": "2.61.1",
                "status": "affected",
                "version": "2.61.0",
                "versionType": "custom"
              },
              {
                "lessThan": "2.62.1",
                "status": "affected",
                "version": "2.62.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-46999",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-20T15:42:37.629006Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-20T15:44:42.866Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "zitadel",
          "vendor": "zitadel",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e= 2.62.0, \u003c 2.62.1"
            },
            {
              "status": "affected",
              "version": "\u003e= 2.61.0, \u003c 2.61.1"
            },
            {
              "status": "affected",
              "version": "\u003e= 2.60.0, \u003c 2.60.2"
            },
            {
              "status": "affected",
              "version": "\u003e= 2.59.0, \u003c 2.59.3"
            },
            {
              "status": "affected",
              "version": "\u003e= 2.58.0, \u003c 2.58.5"
            },
            {
              "status": "affected",
              "version": "\u003e= 2.57.0, \u003c 2.57.5"
            },
            {
              "status": "affected",
              "version": "\u003e= 2.56.0, \u003c 2.56.6"
            },
            {
              "status": "affected",
              "version": "\u003e= 2.55.0, \u003c 2.55.8"
            },
            {
              "status": "affected",
              "version": "\u003c 2.54.10"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Zitadel is an open source identity management platform. ZITADEL\u0027s user grants deactivation mechanism did not work correctly. Deactivated user grants were still provided in token, which could lead to unauthorized access to applications and resources. Additionally, the management and auth API always returned the state as active or did not provide any information about the state. Versions 2.62.1, 2.61.1, 2.60.2, 2.59.3, 2.58.5, 2.57.5, 2.56.6, 2.55.8, and 2.54.10 have been released which address this issue. Users are advised to upgrade. Users unable to upgrade may explicitly remove the user grants to make sure the user does not get access anymore."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-269",
              "description": "CWE-269: Improper Privilege Management",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-09-19T23:11:48.256Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/zitadel/zitadel/security/advisories/GHSA-2w5j-qfvw-2hf5",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-2w5j-qfvw-2hf5"
        }
      ],
      "source": {
        "advisory": "GHSA-2w5j-qfvw-2hf5",
        "discovery": "UNKNOWN"
      },
      "title": "User Grant Deactivation not Working in Zitadel"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2024-46999",
    "datePublished": "2024-09-19T23:11:48.256Z",
    "dateReserved": "2024-09-16T16:10:09.022Z",
    "dateUpdated": "2024-09-20T15:44:42.866Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-46999\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-09-20T00:15:03.350\",\"lastModified\":\"2024-09-24T20:20:39.253\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Zitadel is an open source identity management platform. ZITADEL\u0027s user grants deactivation mechanism did not work correctly. Deactivated user grants were still provided in token, which could lead to unauthorized access to applications and resources. Additionally, the management and auth API always returned the state as active or did not provide any information about the state. Versions 2.62.1, 2.61.1, 2.60.2, 2.59.3, 2.58.5, 2.57.5, 2.56.6, 2.55.8, and 2.54.10 have been released which address this issue. Users are advised to upgrade. Users unable to upgrade may explicitly remove the user grants to make sure the user does not get access anymore.\"},{\"lang\":\"es\",\"value\":\"Zitadel es una plataforma de gesti\u00f3n de identidad de c\u00f3digo abierto. El mecanismo de desactivaci\u00f3n de concesiones de usuario de ZITADEL no funcionaba correctamente. Las concesiones de usuario desactivadas se segu\u00edan proporcionando en token, lo que pod\u00eda provocar un acceso no autorizado a aplicaciones y recursos. Adem\u00e1s, la API de gesti\u00f3n y autenticaci\u00f3n siempre devolv\u00eda el estado como activo o no proporcionaba ninguna informaci\u00f3n sobre el estado. Se han publicado las versiones 2.62.1, 2.61.1, 2.60.2, 2.59.3, 2.58.5, 2.57.5, 2.56.6, 2.55.8 y 2.54.10 que solucionan este problema. Se recomienda a los usuarios que actualicen la versi\u00f3n. Los usuarios que no puedan actualizar pueden eliminar expl\u00edcitamente las concesiones de usuario para asegurarse de que el usuario ya no obtenga acceso.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.1,\"impactScore\":5.2},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-269\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.54.10\",\"matchCriteriaId\":\"B57963B2-68B5-4E7C-97B7-64304BB64F6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.55.0\",\"versionEndExcluding\":\"2.55.8\",\"matchCriteriaId\":\"BD559AF6-7A21-405F-A421-B801F37B9B3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.56.0\",\"versionEndExcluding\":\"2.56.6\",\"matchCriteriaId\":\"04A51D71-DC37-4443-AFD4-5C1DACBD9026\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.57.0\",\"versionEndExcluding\":\"2.57.5\",\"matchCriteriaId\":\"3A379F08-C3D5-4C5F-8799-AC2E9097A655\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.58.0\",\"versionEndExcluding\":\"2.58.5\",\"matchCriteriaId\":\"095B9185-EB6C-4601-95AC-C1F8CE4CF757\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.59.0\",\"versionEndExcluding\":\"2.59.3\",\"matchCriteriaId\":\"790DC952-225B-4AAA-873C-EACDE249982B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.60.0\",\"versionEndExcluding\":\"2.60.2\",\"matchCriteriaId\":\"89E084F5-D132-4244-8E7C-4E26E033A636\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zitadel:zitadel:2.61.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED36FAD4-DAB7-41FE-8C14-119B24E2CCCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zitadel:zitadel:2.62.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D15D8180-D356-4933-8390-19B2DCE2D89F\"}]}]}],\"references\":[{\"url\":\"https://github.com/zitadel/zitadel/security/advisories/GHSA-2w5j-qfvw-2hf5\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-46999\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-20T15:42:37.629006Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*\"], \"vendor\": \"zitadel\", \"product\": \"zitadel\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"2.54.10\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"2.55.0\", \"lessThan\": \"2.55.8\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"2.56.0\", \"lessThan\": \"2.56.6\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"2.57.0\", \"lessThan\": \"2.57.5\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"2.58.0\", \"lessThan\": \"2.58.5\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"2.59.0\", \"lessThan\": \"2.59.3\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"2.60.0\", \"lessThan\": \"2.60.2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"2.61.0\", \"lessThan\": \"2.61.1\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"2.62.0\", \"lessThan\": \"2.62.1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-20T15:44:36.984Z\"}}], \"cna\": {\"title\": \"User Grant Deactivation not Working in Zitadel\", \"source\": {\"advisory\": \"GHSA-2w5j-qfvw-2hf5\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"zitadel\", \"product\": \"zitadel\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003e= 2.62.0, \u003c 2.62.1\"}, {\"status\": \"affected\", \"version\": \"\u003e= 2.61.0, \u003c 2.61.1\"}, {\"status\": \"affected\", \"version\": \"\u003e= 2.60.0, \u003c 2.60.2\"}, {\"status\": \"affected\", \"version\": \"\u003e= 2.59.0, \u003c 2.59.3\"}, {\"status\": \"affected\", \"version\": \"\u003e= 2.58.0, \u003c 2.58.5\"}, {\"status\": \"affected\", \"version\": \"\u003e= 2.57.0, \u003c 2.57.5\"}, {\"status\": \"affected\", \"version\": \"\u003e= 2.56.0, \u003c 2.56.6\"}, {\"status\": \"affected\", \"version\": \"\u003e= 2.55.0, \u003c 2.55.8\"}, {\"status\": \"affected\", \"version\": \"\u003c 2.54.10\"}]}], \"references\": [{\"url\": \"https://github.com/zitadel/zitadel/security/advisories/GHSA-2w5j-qfvw-2hf5\", \"name\": \"https://github.com/zitadel/zitadel/security/advisories/GHSA-2w5j-qfvw-2hf5\", \"tags\": [\"x_refsource_CONFIRM\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Zitadel is an open source identity management platform. ZITADEL\u0027s user grants deactivation mechanism did not work correctly. Deactivated user grants were still provided in token, which could lead to unauthorized access to applications and resources. Additionally, the management and auth API always returned the state as active or did not provide any information about the state. Versions 2.62.1, 2.61.1, 2.60.2, 2.59.3, 2.58.5, 2.57.5, 2.56.6, 2.55.8, and 2.54.10 have been released which address this issue. Users are advised to upgrade. Users unable to upgrade may explicitly remove the user grants to make sure the user does not get access anymore.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-269\", \"description\": \"CWE-269: Improper Privilege Management\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2024-09-19T23:11:48.256Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-46999\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-09-20T15:44:42.866Z\", \"dateReserved\": \"2024-09-16T16:10:09.022Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2024-09-19T23:11:48.256Z\", \"assignerShortName\": \"GitHub_M\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…