-
Notifications
You must be signed in to change notification settings - Fork 61
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
x/vulndb: potential Go vuln in github.com/zitadel/zitadel: CVE-2023-46238 #2155
Labels
excluded: EFFECTIVELY_PRIVATE
This vulnerability exists in a package can be imported, but isn't meant to be outside that module.
Comments
timothy-king
added
the
excluded: EFFECTIVELY_PRIVATE
This vulnerability exists in a package can be imported, but isn't meant to be outside that module.
label
Oct 28, 2023
Change https://go.dev/cl/538781 mentions this issue: |
This was referenced Nov 8, 2023
Closed
This was referenced Nov 29, 2023
Closed
This was referenced Mar 11, 2024
Closed
This was referenced Mar 28, 2024
Closed
Closed
This was referenced Apr 25, 2024
Closed
Change https://go.dev/cl/592763 mentions this issue: |
This was referenced Jul 31, 2024
This was referenced Sep 19, 2024
Closed
Closed
Closed
This was referenced Oct 25, 2024
# for free
to join this conversation on GitHub.
Already have an account?
# to comment
Labels
excluded: EFFECTIVELY_PRIVATE
This vulnerability exists in a package can be imported, but isn't meant to be outside that module.
CVE-2023-46238 references github.com/zitadel/zitadel, which may be a Go module.
Description:
ZITADEL is an identity infrastructure management system. ZITADEL users can upload their own avatar image using various image types including SVG. SVG can include scripts, such as javascript, which can be executed during rendering. Due to a missing security header, an attacker could inject code to an SVG to gain access to the victim’s account in certain scenarios. A victim would need to directly open the malicious image in the browser, where a single session in ZITADEL needs to be active for this exploit to work. If the possible victim had multiple or no active sessions in ZITADEL, the attack would not succeed. This issue has been patched in version 2.39.2 and 2.38.2.
References:
Cross references:
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: