Broken Authorization in ZITADEL Actions
CVE-2022-36051

8.7HIGH

Key Information:

Vendor
Zitadel
Status
Vendor
CVE Published:
31 August 2022

Summary

ZITADEL combines the ease of Auth0 and the versatility of Keycloak.Actions, introduced in ZITADEL 1.42.0 on the API and 1.56.0 for Console, is a feature, where users with role.ORG_OWNER are able to create Javascript Code, which is invoked by the system at certain points during the login. Actions, for example, allow creating authorizations (user grants) on newly created users programmatically. Due to a missing authorization check, Actions were able to grant authorizations for projects that belong to other organizations inside the same Instance. Granting authorizations via API and Console is not affected by this vulnerability. There is currently no known workaround, users should update.

Affected Version(s)

zitadel >= 2.0.0, < 2.2.0 < 2.0.0, 2.2.0

zitadel >= 1.42.0, < 1.87.1 < 1.42.0, 1.87.1

References

CVSS V3.1

Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2022-36051 : Broken Authorization in ZITADEL Actions | SecurityVulnerability.io