GHSA-7h8m-vrxx-vr4m

Suggest an improvement
Source
https://github.com/advisories/GHSA-7h8m-vrxx-vr4m
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/11/GHSA-7h8m-vrxx-vr4m/GHSA-7h8m-vrxx-vr4m.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-7h8m-vrxx-vr4m
Aliases
Related
Published
2023-11-08T17:52:50Z
Modified
2023-11-09T16:14:18Z
Severity
  • 7.3 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L CVSS Calculator
Summary
ZITADEL race condition in lockout policy execution
Details

Impact

ZITADEL provides administrators the possibility to define a Lockout Policy with a maximum amount of failed password check attempts. On every failed password check, the amount of failed checks is compared against the configured maximum. Exceeding the limit, will lock the user and prevent further authentication.

In the affected implementation it was possible for an attacker to start multiple parallel password checks, giving him the possibility to try out more combinations than configured in the Lockout Policy.

Patches

2.x versions are fixed on >= 2.40.5 2.38.x versions are fixed on >= 2.38.3

Workarounds

There is no workaround since a patch is already available.

References

None

Questions

If you have any questions or comments about this advisory, please email us at security@zitadel.com

Database specific
{
    "nvd_published_at": "2023-11-08T22:15:10Z",
    "severity": "HIGH",
    "github_reviewed_at": "2023-11-08T17:52:50Z",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-362"
    ]
}
References

Affected packages

Go / github.com/zitadel/zitadel

Package

Name
github.com/zitadel/zitadel
View open source insights on deps.dev
Purl
pkg:golang/github.com/zitadel/zitadel

Affected ranges

Type
SEMVER
Events
Introduced
2.39.0
Fixed
2.40.5

Go / github.com/zitadel/zitadel

Package

Name
github.com/zitadel/zitadel
View open source insights on deps.dev
Purl
pkg:golang/github.com/zitadel/zitadel

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.38.3