Zitadel is an open source identity management system. In case ZITADEL could not connect to the database, connection information including db name, username and db host name could be returned to the user. This has been addressed in all supported release branches in a point release. There is no workaround since a patch is already available. Users are advised to upgrade.
References
Configurations
No configuration.
History
21 Nov 2024, 09:16
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/zitadel/zitadel/commit/b918603b576d156a08b90917c14c2d019c82ffc6 - | |
References | () https://github.com/zitadel/zitadel/releases/tag/v2.45.7 - | |
References | () https://github.com/zitadel/zitadel/releases/tag/v2.46.7 - | |
References | () https://github.com/zitadel/zitadel/releases/tag/v2.47.10 - | |
References | () https://github.com/zitadel/zitadel/releases/tag/v2.48.5 - | |
References | () https://github.com/zitadel/zitadel/releases/tag/v2.49.5 - | |
References | () https://github.com/zitadel/zitadel/releases/tag/v2.50.3 - | |
References | () https://github.com/zitadel/zitadel/security/advisories/GHSA-q5qj-x2h5-3945 - | |
Summary |
|
01 May 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-01 07:15
Updated : 2024-11-21 09:16
NVD link : CVE-2024-32967
Mitre link : CVE-2024-32967
CVE.ORG link : CVE-2024-32967
JSON object : View
Products Affected
No product.
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor