CVE-2024-29892: ZITADEL's actions can overload reserved claims
6.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.39195%
CWE
Published
3/28/2024
Updated
11/18/2024
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/zitadel/zitadel | go | < 2.42.17 | 2.42.17 |
| github.com/zitadel/zitadel | go | >= 2.43.0, < 2.43.11 | 2.43.11 |
| github.com/zitadel/zitadel | go | >= 2.44.0, < 2.44.7 | 2.44.7 |
| github.com/zitadel/zitadel | go | >= 2.45.0, < 2.45.5 | 2.45.5 |
| github.com/zitadel/zitadel | go | >= 2.46.0, < 2.46.5 | 2.46.5 |
| github.com/zitadel/zitadel | go | >= 2.47.0, < 2.47.8 | 2.47.8 |
| github.com/zitadel/zitadel | go | >= 2.48.0, < 2.48.3 | 2.48.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from missing authorization checks when processing custom claims in actions. The patch commits (e.g. c4c34cb, ad0589d) mention adding protection against custom urn:zitadel:iam claims, indicating the vulnerable code was in the claim processing path. While exact function names aren't visible, ZITADEL's architecture suggests flow.go handles action processing. The confidence is high because: 1) The vulnerability directly relates to claim processing 2) Fix commits explicitly mention claim validation improvements 3) Multiple release notes confirm the pattern of adding reserved claim validation