THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Zendesk (Helpdesk and Chat)

Ok

PUBLISHED

CVE-2024-32967

Zitadel exposes internal database user name and host information

Reserved:2024-04-22
Published:2024-05-01
Updated:2024-06-06

Description

Zitadel is an open source identity management system. In case ZITADEL could not connect to the database, connection information including db name, username and db host name could be returned to the user. This has been addressed in all supported release branches in a point release. There is no workaround since a patch is already available. Users are advised to upgrade.



MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Product status

< 2.45.7
affected

>= 2.46.0,< 2.46.7
affected

>= 2.47.0, < 2.47.10
affected

>= 2.48.0, < 2.48.5
affected

>= 2.49.0, < 2.49.5
affected

>= 2.50.0, < 2.50.3
affected

References

https://github.com/zitadel/zitadel/security/advisories/GHSA-q5qj-x2h5-3945

https://github.com/zitadel/zitadel/commit/b918603b576d156a08b90917c14c2d019c82ffc6

https://github.com/zitadel/zitadel/releases/tag/v2.45.7

https://github.com/zitadel/zitadel/releases/tag/v2.46.7

https://github.com/zitadel/zitadel/releases/tag/v2.47.10

https://github.com/zitadel/zitadel/releases/tag/v2.48.5

https://github.com/zitadel/zitadel/releases/tag/v2.49.5

https://github.com/zitadel/zitadel/releases/tag/v2.50.3

cve.org CVE-2024-32967

nvd.nist.gov CVE-2024-32967

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-32967