diff --git a/http/cves/2024/CVE-2024-49757.yaml b/http/cves/2024/CVE-2024-49757.yaml new file mode 100644 index 0000000000..eb9363a955 --- /dev/null +++ b/http/cves/2024/CVE-2024-49757.yaml @@ -0,0 +1,48 @@ +id: CVE-2024-49757 + +info: + name: Zitadel - User Registration Bypass + author: Sujal Tuladhar + severity: high + description: | + The open-source identity infrastructure software Zitadel allows administrators to disable the user self-registration. Due to a missing security check in versions prior to 2.64.0, 2.63.5, 2.62.7, 2.61.4, 2.60.4, 2.59.5, and 2.58.7, disabling the "User Registration allowed" option only hid the registration button on the login page. Users could bypass this restriction by directly accessing the registration URL (/ui/login/loginname) and register a user that way. Versions 2.64.0, 2.63.5, 2.62.7, 2.61.4, 2.60.4, 2.59.5, and 2.58.7 contain a patch. No known workarounds are available. + reference: + - https://github.com/zitadel/zitadel/releases/tag/v2.62.7 + - https://nvd.nist.gov/vuln/detail/CVE-2024-49757 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2024-49757 + cwe-id: CWE-287 + epss-score: 0.00044 + epss-percentile: 0.14016 + metadata: + verified: true + max-request: 1 + shodan-query: title:"Zitadel" + tags: cve,cve2024,register,zitadel + +http: + - method: GET + path: + - "{{BaseURL}}/ui/login/register" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "Registration is not allowed (Internal)" + negative: true + + - type: word + part: body + words: + - "Enter your Userdata" + - "zitadel" + condition: and + case-insensitive: true + + - type: status + status: + - 200