NVD Vulnerability Detail
Search Exploit, PoC
CVE-2024-41953
Summary

Zitadel is an open source identity management system. ZITADEL uses HTML for emails and renders certain information such as usernames dynamically. That information can be entered by users or administrators. Due to a missing output sanitization, these emails could include malicious code. This may potentially lead to a threat where an attacker, without privileges, could send out altered notifications that are part of the registration processes. An attacker could create a malicious link, where the injected code would be rendered as part of the email. On the user's detail page, the username was also not sanitized and would also render HTML, giving an attacker the same vulnerability. While it was possible to inject HTML including javascript, the execution of such scripts would be prevented by most email clients and the Content Security Policy in Console UI. This vulnerability is fixed in 2.58.1, 2.57.1, 2.56.2, 2.55.5, 2.54.8 2.53.9, and 2.52.3.

Publication Date Aug. 1, 2024, 2:15 a.m.
Registration Date Aug. 1, 2024, 10 a.m.
Last Update Aug. 1, 2024, 9:42 p.m.
Related information, measures and tools
Common Vulnerabilities List

JVN Vulnerability Information
ZITADEL におけるクロスサイトスクリプティングの脆弱性
Title ZITADEL におけるクロスサイトスクリプティングの脆弱性
Summary

ZITADEL には、クロスサイトスクリプティングの脆弱性が存在します。

Possible impacts 情報を取得される、および情報を改ざんされる可能性があります。
Solution

ベンダアドバイザリまたはパッチ情報が公開されています。参考情報を参照して適切な対策を実施してください。

Publication Date July 31, 2024, midnight
Registration Date Jan. 9, 2025, 6:24 p.m.
Last Update Jan. 9, 2025, 6:24 p.m.
Affected System
ZITADEL
ZITADEL 2.52.0 以上 2.52.3 未満
ZITADEL 2.53.0 以上 2.53.9 未満
ZITADEL 2.54.0 以上 2.54.8 未満
ZITADEL 2.55.0 以上 2.55.5 未満
ZITADEL 2.56.0 以上 2.56.2 未満
ZITADEL 2.57.0
ZITADEL 2.58.0
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
その他
Change Log
No Changed Details Date of change
1 [2025年01月09日]
  掲載
Jan. 9, 2025, 6:24 p.m.