Skip to content

Commit 090cb9f

Browse files
committed
data/reports: add GO-2024-2655.yaml
Aliases: CVE-2024-28855, GHSA-hfrg-4jwr-jfpj Fixes #2655 Change-Id: Ib2d6096208f18e8e2e2bee2dbad915fb3f3e6c85 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/573495 TryBot-Result: Gopher Robot <[email protected]> Run-TryBot: Tim King <[email protected]> Reviewed-by: Damien Neil <[email protected]> LUCI-TryBot-Result: Go LUCI <[email protected]>
1 parent 6432e7a commit 090cb9f

File tree

2 files changed

+97
-0
lines changed

2 files changed

+97
-0
lines changed

data/osv/GO-2024-2655.json

+58
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,58 @@
1+
{
2+
"schema_version": "1.3.1",
3+
"id": "GO-2024-2655",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"published": "0001-01-01T00:00:00Z",
6+
"aliases": [
7+
"CVE-2024-28855",
8+
"GHSA-hfrg-4jwr-jfpj"
9+
],
10+
"summary": "XSS in github.com/zitadel/zitadel",
11+
"details": "The Login UI did not sanitize input parameters. An attacker could create a malicious link, where injected code would be rendered as part of the login screen.",
12+
"affected": [
13+
{
14+
"package": {
15+
"name": "github.com/zitadel/zitadel",
16+
"ecosystem": "Go"
17+
},
18+
"ranges": [
19+
{
20+
"type": "SEMVER",
21+
"events": [
22+
{
23+
"introduced": "0"
24+
},
25+
{
26+
"fixed": "1.80.0-v2.20.0.20240312162750-5908b97e7c22"
27+
}
28+
]
29+
}
30+
],
31+
"ecosystem_specific": {
32+
"imports": [
33+
{
34+
"path": "github.com/zitadel/zitadel/internal/renderer"
35+
}
36+
]
37+
}
38+
}
39+
],
40+
"references": [
41+
{
42+
"type": "ADVISORY",
43+
"url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-hfrg-4jwr-jfpj"
44+
},
45+
{
46+
"type": "FIX",
47+
"url": "https://github.com/zitadel/zitadel/commit/07ec2efa9dc62f7a6c3a58c112b2879d24bc3e3c"
48+
}
49+
],
50+
"credits": [
51+
{
52+
"name": "Daniel Philipp (OWT) and Thomas Wickham (Synopsis)"
53+
}
54+
],
55+
"database_specific": {
56+
"url": "https://pkg.go.dev/vuln/GO-2024-2655"
57+
}
58+
}

data/reports/GO-2024-2655.yaml

+39
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
id: GO-2024-2655
2+
modules:
3+
- module: github.com/zitadel/zitadel
4+
versions:
5+
- fixed: 1.80.0-v2.20.0.20240312162750-5908b97e7c22
6+
non_go_versions:
7+
- fixed: 2.41.15
8+
- introduced: 2.42.0
9+
fixed: 2.42.15
10+
- introduced: 2.43.0
11+
fixed: 2.43.9
12+
- introduced: 2.44.0
13+
fixed: 2.44.3
14+
- introduced: 2.45.0
15+
fixed: 2.45.1
16+
- introduced: 2.46.0
17+
fixed: 2.46.1
18+
- introduced: 2.47.0
19+
fixed: 2.47.4
20+
vulnerable_at: 1.80.0-v2.20
21+
packages:
22+
- package: github.com/zitadel/zitadel/internal/renderer
23+
skip_fix: Uses replacement directives.
24+
summary: XSS in github.com/zitadel/zitadel
25+
description: |-
26+
The Login UI did not sanitize input parameters. An attacker could create a
27+
malicious link, where injected code would be rendered as part of the login
28+
screen.
29+
cves:
30+
- CVE-2024-28855
31+
ghsas:
32+
- GHSA-hfrg-4jwr-jfpj
33+
credits:
34+
- Daniel Philipp (OWT) and Thomas Wickham (Synopsis)
35+
references:
36+
- advisory: https://github.com/zitadel/zitadel/security/advisories/GHSA-hfrg-4jwr-jfpj
37+
- fix: https://github.com/zitadel/zitadel/commit/07ec2efa9dc62f7a6c3a58c112b2879d24bc3e3c
38+
notes:
39+
- 1.80.0-v2.20.0.20240312162750-5908b97e7c22 corresponds to 2.47.4. We are using this as a timestamp.

0 commit comments

Comments
 (0)