diff --git a/http/cves/2024/CVE-2024-49757 b/http/cves/2024/CVE-2024-49757 deleted file mode 100644 index 211b514d34..0000000000 --- a/http/cves/2024/CVE-2024-49757 +++ /dev/null @@ -1,40 +0,0 @@ -id: zitadel-cve-2024-49757-registration-check - -info: - name: Zitadel User Registration Check - author: Sujal Tuladhar - severity: high - description: | - Checks for the presence of the Zitadel registration endpoint (/ui/login/register) - in unpatched versions (< 2.63.4) where user registration can be bypassed if not configured correctly. - tags: zitadel,cve,cve-2024-49757,registration - -requests: - - method: GET - path: - - "{{BaseURL}}/auth/v1/healthz" # To confirm Zitadel technology - - matchers-condition: and - matchers: - - type: word - words: - - "zitadel" - part: body - - type: status - status: - - 200 - - - method: GET - path: - - "{{BaseURL}}/ui/login/register" # Check registration endpoint - - matchers-condition: and - matchers: - - type: word - words: - - "Registration is not allowed (Internal)" - part: body - negative: true # Marks as vulnerable only if this phrase is absent - - type: status - status: - - 200 # Vulnerable if 200 status and phrase is absent diff --git a/http/cves/2024/CVE-2024-49757.yaml b/http/cves/2024/CVE-2024-49757.yaml new file mode 100644 index 0000000000..029b1350dc --- /dev/null +++ b/http/cves/2024/CVE-2024-49757.yaml @@ -0,0 +1,48 @@ +id: CVE-2024-49757 + +info: + name: Zitadel - User Registration Bypass + author: Sujal Tuladhar + severity: high + description: | + The open-source identity infrastructure software Zitadel allows administrators to disable the user self-registration. Due to a missing security check in versions prior to 2.64.0, 2.63.5, 2.62.7, 2.61.4, 2.60.4, 2.59.5, and 2.58.7, disabling the "User Registration allowed" option only hid the registration button on the login page. Users could bypass this restriction by directly accessing the registration URL (/ui/login/loginname) and register a user that way. Versions 2.64.0, 2.63.5, 2.62.7, 2.61.4, 2.60.4, 2.59.5, and 2.58.7 contain a patch. No known workarounds are available. + reference: + - https://github.com/zitadel/zitadel/releases/tag/v2.58.7 + - https://github.com/zitadel/zitadel/releases/tag/v2.59.5 + - https://github.com/zitadel/zitadel/releases/tag/v2.60.4 + - https://github.com/zitadel/zitadel/releases/tag/v2.61.4 + - https://github.com/zitadel/zitadel/releases/tag/v2.62.7 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2024-49757 + cwe-id: CWE-287 + epss-score: 0.00044 + epss-percentile: 0.14016 + metadata: + verified: true + max-request: 1 + shodan-query: title:"Zitadel" + tags: cve,cve2024,register,zitadel + +http: + - method: GET + path: + - "{{BaseURL}}/ui/login/register" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "Registration is not allowed (Internal)" + negative: true + + - type: word + part: body + words: + - "Enter your Userdata" + + - type: status + status: + - 200