ZITADEL provides identity infrastructure. In versions 2.37.2 and prior, ZITADEL administrators can enable a setting called "Ignoring unknown usernames" which helps mitigate attacks that try to guess/enumerate usernames. While this settings was properly working during the authentication process it did not work correctly on the password reset flow. This meant that even if this feature was active that an attacker could use the password reset function to verify if an account exist within ZITADEL. This bug has been patched in versions 2.37.3 and 2.38.0. No known workarounds are available.
References
Link | Resource |
---|---|
https://github.com/zitadel/zitadel/releases/tag/v2.37.3 | Release Notes |
https://github.com/zitadel/zitadel/releases/tag/v2.38.0 | Release Notes |
https://github.com/zitadel/zitadel/security/advisories/GHSA-v683-rcxx-vpff | Vendor Advisory |
https://github.com/zitadel/zitadel/releases/tag/v2.37.3 | Release Notes |
https://github.com/zitadel/zitadel/releases/tag/v2.38.0 | Release Notes |
https://github.com/zitadel/zitadel/security/advisories/GHSA-v683-rcxx-vpff | Vendor Advisory |
Configurations
History
21 Nov 2024, 08:25
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-10 17:15
Updated : 2024-11-21 08:25
NVD link : CVE-2023-44399
Mitre link : CVE-2023-44399
CVE.ORG link : CVE-2023-44399
JSON object : View
Products Affected
zitadel
- zitadel
CWE
CWE-640
Weak Password Recovery Mechanism for Forgotten Password