Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5175425-BCED-488C-8786-E093C1D5E561", "versionEndExcluding": "2.52.3", "versionStartIncluding": "2.52.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FEB64E1-AA7A-44A6-97EA-D82646DA5D07", "versionEndExcluding": "2.53.9", "versionStartIncluding": "2.53.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", "matchCriteriaId": "F42BFC4E-33C3-48F0-9CAB-72D2EEFEF163", "versionEndExcluding": "2.54.8", "versionStartIncluding": "2.54.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", "matchCriteriaId": "C81EA150-B7C8-4682-9D33-B04DB4075205", "versionEndExcluding": "2.55.5", "versionStartIncluding": "2.55.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", "matchCriteriaId": "7675309A-22D1-4A64-9CB6-F36A496C421F", "versionEndExcluding": "2.56.2", "versionStartIncluding": "2.56.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:zitadel:zitadel:2.57.0:-:*:*:*:*:*:*", "matchCriteriaId": "CAA9A765-F2B2-46B8-BEA8-F9CEA81BEFA3", "vulnerable": true}, {"criteria": "cpe:2.3:a:zitadel:zitadel:2.57.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "4863B756-9DE4-4171-8035-E6965D55D578", "vulnerable": true}, {"criteria": "cpe:2.3:a:zitadel:zitadel:2.57.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "C2FEB539-0344-44F4-9595-9C35033FBF14", "vulnerable": true}, {"criteria": "cpe:2.3:a:zitadel:zitadel:2.58.0:*:*:*:*:*:*:*", "matchCriteriaId": "02DB4060-6B1F-4FDB-9B50-6C47B613B8B1", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Zitadel is an open source identity management system. ZITADEL uses HTML for emails and renders certain information such as usernames dynamically. That information can be entered by users or administrators. Due to a missing output sanitization, these emails could include malicious code. This may potentially lead to a threat where an attacker, without privileges, could send out altered notifications that are part of the registration processes. An attacker could create a malicious link, where the injected code would be rendered as part of the email. On the user's detail page, the username was also not sanitized and would also render HTML, giving an attacker the same vulnerability. While it was possible to inject HTML including javascript, the execution of such scripts would be prevented by most email clients and the Content Security Policy in Console UI. This vulnerability is fixed in 2.58.1, 2.57.1, 2.56.2, 2.55.5, 2.54.8 2.53.9, and 2.52.3."}, {"lang": "es", "value": "Zitadel es un sistema de gesti\u00f3n de identidades de c\u00f3digo abierto. ZITADEL utiliza HTML para los correos electr\u00f3nicos y muestra cierta informaci\u00f3n, como los nombres de usuario, de forma din\u00e1mica. Esa informaci\u00f3n puede ser ingresada por usuarios o administradores. Debido a la falta de sanitizaci\u00f3n de la salida, estos correos electr\u00f3nicos podr\u00edan incluir c\u00f3digo malicioso. Esto puede generar potencialmente una amenaza en la que un atacante, sin privilegios, podr\u00eda enviar notificaciones alteradas que forman parte de los procesos de registro. Un atacante podr\u00eda crear un enlace malicioso, donde el c\u00f3digo inyectado se presentar\u00eda como parte del correo electr\u00f3nico. En la p\u00e1gina de detalles del usuario, el nombre de usuario tampoco estaba sanitizado y tambi\u00e9n representaba HTML, lo que le daba al atacante la misma vulnerabilidad. Si bien era posible inyectar HTML, incluido JavaScript, la mayor\u00eda de los clientes de correo electr\u00f3nico y la Pol\u00edtica de seguridad de contenido en la interfaz de usuario de la consola impedir\u00edan la ejecuci\u00f3n de dichos scripts. Esta vulnerabilidad se solucion\u00f3 en 2.58.1, 2.57.1, 2.56.2, 2.55.5, 2.54.8 2.53.9 y 2.52.3."}], "id": "CVE-2024-41953", "lastModified": "2025-01-08T18:29:25.370", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary"}, {"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2024-07-31T17:15:10.850", "references": [{"source": "security-advisories@github.com", "tags": ["Patch"], "url": "https://github.com/zitadel/zitadel/commit/0e1f99e987b5851caec45a72660fe9f67e425747"}, {"source": "security-advisories@github.com", "tags": ["Patch"], "url": "https://github.com/zitadel/zitadel/commit/38da602ee1cfc35c0d7918c298fbfc3f3674133b"}, {"source": "security-advisories@github.com", "tags": ["Patch"], "url": "https://github.com/zitadel/zitadel/commit/4b59cac67bb89c1f3f84a2041dd273d11151d29f"}, {"source": "security-advisories@github.com", "tags": ["Patch"], "url": "https://github.com/zitadel/zitadel/commit/c1a3fc72dde16e987d8a09aa291e7c2edfc928f7"}, {"source": "security-advisories@github.com", "tags": ["Patch"], "url": "https://github.com/zitadel/zitadel/commit/c353f82f89c6982c0888c6763363296cf4263cb2"}, {"source": "security-advisories@github.com", "tags": ["Patch"], "url": "https://github.com/zitadel/zitadel/commit/d04ac6df8f2f0243e649b802a8bfa6176cef0923"}, {"source": "security-advisories@github.com", "tags": ["Patch"], "url": "https://github.com/zitadel/zitadel/commit/f846616a3f022e88e3ea8cea05d3254ad86f1615"}, {"source": "security-advisories@github.com", "tags": ["Release Notes"], "url": "https://github.com/zitadel/zitadel/releases/tag/v2.52.3"}, {"source": "security-advisories@github.com", "tags": ["Release Notes"], "url": "https://github.com/zitadel/zitadel/releases/tag/v2.53.9"}, {"source": "security-advisories@github.com", "tags": ["Release Notes"], "url": "https://github.com/zitadel/zitadel/releases/tag/v2.54.8"}, {"source": "security-advisories@github.com", "tags": ["Release Notes"], "url": "https://github.com/zitadel/zitadel/releases/tag/v2.55.5"}, {"source": "security-advisories@github.com", "tags": ["Release Notes"], "url": "https://github.com/zitadel/zitadel/releases/tag/v2.56.2"}, {"source": "security-advisories@github.com", "tags": ["Release Notes"], "url": "https://github.com/zitadel/zitadel/releases/tag/v2.57.1"}, {"source": "security-advisories@github.com", "tags": ["Release Notes"], "url": "https://github.com/zitadel/zitadel/releases/tag/v2.58.1"}, {"source": "security-advisories@github.com", "tags": ["Vendor Advisory"], "url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-v333-7h2p-5fhv"}], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}], "source": "security-advisories@github.com", "type": "Secondary"}, {"description": [{"lang": "en", "value": "CWE-79"}], "source": "nvd@nist.gov", "type": "Primary"}]}