CVE-2024-32967

Zitadel is an open source identity management system. In case ZITADEL could not connect to the database, connection information including db name, username and db host name could be returned to the user. This has been addressed in all supported release branches in a point release. There is no workaround since a patch is already available. Users are advised to upgrade.
Configurations

No configuration.

History

21 Nov 2024, 09:16

Type Values Removed Values Added
References () https://github.com/zitadel/zitadel/commit/b918603b576d156a08b90917c14c2d019c82ffc6 - () https://github.com/zitadel/zitadel/commit/b918603b576d156a08b90917c14c2d019c82ffc6 -
References () https://github.com/zitadel/zitadel/releases/tag/v2.45.7 - () https://github.com/zitadel/zitadel/releases/tag/v2.45.7 -
References () https://github.com/zitadel/zitadel/releases/tag/v2.46.7 - () https://github.com/zitadel/zitadel/releases/tag/v2.46.7 -
References () https://github.com/zitadel/zitadel/releases/tag/v2.47.10 - () https://github.com/zitadel/zitadel/releases/tag/v2.47.10 -
References () https://github.com/zitadel/zitadel/releases/tag/v2.48.5 - () https://github.com/zitadel/zitadel/releases/tag/v2.48.5 -
References () https://github.com/zitadel/zitadel/releases/tag/v2.49.5 - () https://github.com/zitadel/zitadel/releases/tag/v2.49.5 -
References () https://github.com/zitadel/zitadel/releases/tag/v2.50.3 - () https://github.com/zitadel/zitadel/releases/tag/v2.50.3 -
References () https://github.com/zitadel/zitadel/security/advisories/GHSA-q5qj-x2h5-3945 - () https://github.com/zitadel/zitadel/security/advisories/GHSA-q5qj-x2h5-3945 -
Summary
  • (es) Zitadel es un sistema de gestión de identidades de código abierto. En caso de que ZITADEL no pudiera conectarse a la base de datos, se podría devolver al usuario la información de conexión, incluido el nombre de la base de datos, el nombre de usuario y el nombre del host de la base de datos. Esto se ha solucionado en todas las ramas de versiones admitidas en una versión puntual. No existe ningún workaround porque ya hay un parche disponible. Se recomienda a los usuarios que actualicen.

01 May 2024, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-01 07:15

Updated : 2024-11-21 09:16


NVD link : CVE-2024-32967

Mitre link : CVE-2024-32967

CVE.ORG link : CVE-2024-32967


JSON object : View

Products Affected

No product.

CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor