CVE-2024-41952

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-41952
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-41952.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-41952
Aliases
Published
2024-07-31T16:30:22Z
Modified
2025-10-22T18:44:20.830809Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
Zitadel has an "Ignoring unknown usernames" vulnerability
Details

Zitadel is an open source identity management system. ZITADEL administrators can enable a setting called "Ignoring unknown usernames" which helps mitigate attacks that try to guess/enumerate usernames. If enabled, ZITADEL will show the password prompt even if the user doesn't exist and report "Username or Password invalid". Due to a implementation change to prevent deadlocks calling the database, the flag would not be correctly respected in all cases and an attacker would gain information if an account exist within ZITADEL, since the error message shows "object not found" instead of the generic error message. This vulnerability is fixed in 2.58.1, 2.57.1, 2.56.2, 2.55.5, 2.54.8, and 2.53.9.

Database specific
{
    "cwe_ids": [
        "CWE-203"
    ]
}
References

Affected packages

Git / github.com/zitadel/zitadel

Affected ranges

Type
GIT
Repo
https://github.com/zitadel/zitadel
Events
Type
GIT
Repo
https://github.com/zitadel/zitadel
Events
Type
GIT
Repo
https://github.com/zitadel/zitadel
Events
Type
GIT
Repo
https://github.com/zitadel/zitadel
Events
Type
GIT
Repo
https://github.com/zitadel/zitadel
Events
Type
GIT
Repo
https://github.com/zitadel/zitadel
Events

Affected versions

v2.*

v2.53.0
v2.53.1
v2.53.2
v2.53.3
v2.53.4
v2.53.5
v2.53.6
v2.53.7
v2.53.8
v2.54.0
v2.54.1
v2.54.2
v2.54.3
v2.54.4
v2.54.5
v2.54.6
v2.54.7
v2.55.0
v2.55.1
v2.55.2
v2.55.3
v2.55.4
v2.56.0
v2.56.1
v2.57.0
v2.58.0