RefreshToken invalidation vulnerability
CVE-2023-22492

5.9MEDIUM

Key Information:

Vendor
Zitadel
Status
Vendor
CVE Published:
11 January 2023

Summary

ZITADEL is a combination of Auth0 and Keycloak. RefreshTokens is an OAuth 2.0 feature that allows applications to retrieve new access tokens and refresh the user's session without the need for interacting with a UI. RefreshTokens were not invalidated when a user was locked or deactivated. The deactivated or locked user was able to obtain a valid access token only through a refresh token grant. When the locked or deactivated user’s session was already terminated (“logged out”) then it was not possible to create a new session. Renewal of access token through a refresh token grant is limited to the configured amount of time (RefreshTokenExpiration). As a workaround, ensure the RefreshTokenExpiration in the OIDC settings of your instance is set according to your security requirements. This issue has been patched in versions 2.17.3 and 2.16.4.

Affected Version(s)

zitadel >= 2.17.0, < 2.17.3 < 2.17.0, 2.17.3

zitadel >= 2.0.0, < 2.16.4 < 2.0.0, 2.16.4

References

CVSS V3.1

Score:
5.9
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2023-22492 : RefreshToken invalidation vulnerability | SecurityVulnerability.io