Vulnerability Report: GO-2024-2637
- CVE-2024-28197, GHSA-mq4x-r2w3-j7mr
- Affects: github.com/zitadel/zitadel
- Published: Jun 05, 2024
- Modified: Jul 09, 2024
- Unreviewed
Account Takeover via Session Fixation in Zitadel [Bypassing MFA] in github.com/zitadel/zitadel. NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions. (If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.) The additional affected modules and versions are: github.com/zitadel/zitadel before v2.44.3, from v2.45.0 before v2.45.1.
For detailed information about this vulnerability, visit https://github.com/zitadel/zitadel/security/advisories/GHSA-mq4x-r2w3-j7mr or https://nvd.nist.gov/vuln/detail/CVE-2024-28197.
Affected Modules
-
PathGo VersionsCustom Versions*
-
all versions, no known fixedbefore 2.44.3, from 2.45.0 before 2.45.1
*Custom versions, which can't be mapped automatically to standard Go module versions, are ignored by govulncheck
. (See this note on versions for more details.)
Aliases
References
- https://github.com/zitadel/zitadel/security/advisories/GHSA-mq4x-r2w3-j7mr
- https://nvd.nist.gov/vuln/detail/CVE-2024-28197
- https://github.com/zitadel/zitadel/commit/d4c553b75a214e41299af010ef4b26174a0f802c
- https://github.com/zitadel/zitadel/commit/e82cb51eb819c6cdba8123c9c34c5739b46b29eb
- https://vuln.go.dev/ID/GO-2024-2637.json