Zitadel exposing internal database user name and host information in github.com/zitadel/zitadel.
NOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.
(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)
The additional affected modules and versions are: github.com/zitadel/zitadel before v2.45.7, from v2.47.0 before v2.47.10, from v2.48.0 before v2.48.5, from v2.49.0 before v2.49.5, from v2.50.0 before v2.50.3.
{
"url": "https://pkg.go.dev/vuln/GO-2024-2804",
"review_status": "UNREVIEWED"
}{
"custom_ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.45.7"
},
{
"introduced": "2.47.0"
},
{
"fixed": "2.47.10"
},
{
"introduced": "2.48.0"
},
{
"fixed": "2.48.5"
},
{
"introduced": "2.49.0"
},
{
"fixed": "2.49.5"
},
{
"introduced": "2.50.0"
},
{
"fixed": "2.50.3"
}
],
"type": "ECOSYSTEM"
}
]
}