ZITADEL provides identity infrastructure. In versions 2.37.2 and prior, ZITADEL administrators can enable a setting called "Ignoring unknown usernames" which helps mitigate attacks that try to guess/enumerate usernames. While this settings was properly working during the authentication process it did not work correctly on the password reset flow. This meant that even if this feature was active that an attacker could use the password reset function to verify if an account exist within ZITADEL. This bug has been patched in versions 2.37.3 and 2.38.0. No known workarounds are available.
History

Thu, 19 Sep 2024 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2023-10-10T16:55:45.309Z

Updated: 2024-09-19T14:18:10.146Z

Reserved: 2023-09-28T17:56:32.614Z

Link: CVE-2023-44399

cve-icon Vulnrichment

Updated: 2024-08-02T20:07:32.937Z

cve-icon NVD

Status : Analyzed

Published: 2023-10-10T17:15:13.107

Modified: 2023-10-23T19:22:17.393

Link: CVE-2023-44399

cve-icon Redhat

No data.