File tree 2 files changed +97
-0
lines changed
2 files changed +97
-0
lines changed Original file line number Diff line number Diff line change
1
+ {
2
+ "schema_version" : " 1.3.1" ,
3
+ "id" : " GO-2024-2655" ,
4
+ "modified" : " 0001-01-01T00:00:00Z" ,
5
+ "published" : " 0001-01-01T00:00:00Z" ,
6
+ "aliases" : [
7
+ " CVE-2024-28855" ,
8
+ " GHSA-hfrg-4jwr-jfpj"
9
+ ],
10
+ "summary" : " XSS in github.com/zitadel/zitadel" ,
11
+ "details" : " The Login UI did not sanitize input parameters. An attacker could create a malicious link, where injected code would be rendered as part of the login screen." ,
12
+ "affected" : [
13
+ {
14
+ "package" : {
15
+ "name" : " github.com/zitadel/zitadel" ,
16
+ "ecosystem" : " Go"
17
+ },
18
+ "ranges" : [
19
+ {
20
+ "type" : " SEMVER" ,
21
+ "events" : [
22
+ {
23
+ "introduced" : " 0"
24
+ },
25
+ {
26
+ "fixed" : " 1.80.0-v2.20.0.20240312162750-5908b97e7c22"
27
+ }
28
+ ]
29
+ }
30
+ ],
31
+ "ecosystem_specific" : {
32
+ "imports" : [
33
+ {
34
+ "path" : " github.com/zitadel/zitadel/internal/renderer"
35
+ }
36
+ ]
37
+ }
38
+ }
39
+ ],
40
+ "references" : [
41
+ {
42
+ "type" : " ADVISORY" ,
43
+ "url" : " https://github.com/zitadel/zitadel/security/advisories/GHSA-hfrg-4jwr-jfpj"
44
+ },
45
+ {
46
+ "type" : " FIX" ,
47
+ "url" : " https://github.com/zitadel/zitadel/commit/07ec2efa9dc62f7a6c3a58c112b2879d24bc3e3c"
48
+ }
49
+ ],
50
+ "credits" : [
51
+ {
52
+ "name" : " Daniel Philipp (OWT) and Thomas Wickham (Synopsis)"
53
+ }
54
+ ],
55
+ "database_specific" : {
56
+ "url" : " https://pkg.go.dev/vuln/GO-2024-2655"
57
+ }
58
+ }
Original file line number Diff line number Diff line change
1
+ id : GO-2024-2655
2
+ modules :
3
+ - module : github.com/zitadel/zitadel
4
+ versions :
5
+ - fixed : 1.80.0-v2.20.0.20240312162750-5908b97e7c22
6
+ non_go_versions :
7
+ - fixed : 2.41.15
8
+ - introduced : 2.42.0
9
+ fixed : 2.42.15
10
+ - introduced : 2.43.0
11
+ fixed : 2.43.9
12
+ - introduced : 2.44.0
13
+ fixed : 2.44.3
14
+ - introduced : 2.45.0
15
+ fixed : 2.45.1
16
+ - introduced : 2.46.0
17
+ fixed : 2.46.1
18
+ - introduced : 2.47.0
19
+ fixed : 2.47.4
20
+ vulnerable_at : 1.80.0-v2.20
21
+ packages :
22
+ - package : github.com/zitadel/zitadel/internal/renderer
23
+ skip_fix : Uses replacement directives.
24
+ summary : XSS in github.com/zitadel/zitadel
25
+ description : |-
26
+ The Login UI did not sanitize input parameters. An attacker could create a
27
+ malicious link, where injected code would be rendered as part of the login
28
+ screen.
29
+ cves :
30
+ - CVE-2024-28855
31
+ ghsas :
32
+ - GHSA-hfrg-4jwr-jfpj
33
+ credits :
34
+ - Daniel Philipp (OWT) and Thomas Wickham (Synopsis)
35
+ references :
36
+ - advisory : https://github.com/zitadel/zitadel/security/advisories/GHSA-hfrg-4jwr-jfpj
37
+ - fix : https://github.com/zitadel/zitadel/commit/07ec2efa9dc62f7a6c3a58c112b2879d24bc3e3c
38
+ notes :
39
+ - 1.80.0-v2.20.0.20240312162750-5908b97e7c22 corresponds to 2.47.4. We are using this as a timestamp.
You can’t perform that action at this time.
0 commit comments