CVE-2024-29891

ZITADEL users can upload their own avatar image and various image types are allowed. Due to a missing check, an attacker could upload HTML and pretend it is an image to gain access to the victim's account in certain scenarios. A possible victim would need to directly open the supposed image in the browser, where a session in ZITADEL needs to be active for this exploit to work. The exploit could only be reproduced if the victim was using Firefox. Chrome, Safari as well as Edge did not execute the code. This vulnerability is fixed in 2.48.3, 2.47.8, 2.46.5, 2.45.5, 2.44.7, 2.43.11, and 2.42.17.
Configurations

No configuration.

History

21 Nov 2024, 09:08

Type Values Removed Values Added
References () https://github.com/zitadel/zitadel/releases/tag/v2.42.17 - () https://github.com/zitadel/zitadel/releases/tag/v2.42.17 -
References () https://github.com/zitadel/zitadel/releases/tag/v2.43.11 - () https://github.com/zitadel/zitadel/releases/tag/v2.43.11 -
References () https://github.com/zitadel/zitadel/releases/tag/v2.44.7 - () https://github.com/zitadel/zitadel/releases/tag/v2.44.7 -
References () https://github.com/zitadel/zitadel/releases/tag/v2.45.5 - () https://github.com/zitadel/zitadel/releases/tag/v2.45.5 -
References () https://github.com/zitadel/zitadel/releases/tag/v2.46.5 - () https://github.com/zitadel/zitadel/releases/tag/v2.46.5 -
References () https://github.com/zitadel/zitadel/releases/tag/v2.47.8 - () https://github.com/zitadel/zitadel/releases/tag/v2.47.8 -
References () https://github.com/zitadel/zitadel/releases/tag/v2.48.3 - () https://github.com/zitadel/zitadel/releases/tag/v2.48.3 -
References () https://github.com/zitadel/zitadel/security/advisories/GHSA-hr5w-cwwq-2v4m - () https://github.com/zitadel/zitadel/security/advisories/GHSA-hr5w-cwwq-2v4m -
Summary
  • (es) Los usuarios de ZITADEL pueden cargar su propia imagen de avatar y se permiten varios tipos de imágenes. Debido a la falta de un cheque, un atacante podría cargar HTML y pretender que es una imagen para obtener acceso a la cuenta de la víctima en ciertos escenarios. Una posible víctima necesitaría abrir directamente la supuesta imagen en el navegador, donde debe haber una sesión activa en ZITADEL para que este exploit funcione. El exploit sólo podría reproducirse si la víctima estuviera usando Firefox. Chrome, Safari y Edge no ejecutaron el código. Esta vulnerabilidad se solucionó en 2.48.3, 2.47.8, 2.46.5, 2.45.5, 2.44.7, 2.43.11 y 2.42.17.

27 Mar 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-27 20:15

Updated : 2024-11-21 09:08


NVD link : CVE-2024-29891

Mitre link : CVE-2024-29891

CVE.ORG link : CVE-2024-29891


JSON object : View

Products Affected

No product.

CWE
CWE-434

Unrestricted Upload of File with Dangerous Type