ZITADEL provides identity infrastructure. In versions 2.37.2 and prior, ZITADEL administrators can enable a setting called "Ignoring unknown usernames" which helps mitigate attacks that try to guess/enumerate usernames. While this settings was properly working during the authentication process it did not work correctly on the password reset flow. This meant that even if this feature was active that an attacker could use the password reset function to verify if an account exist within ZITADEL. This bug has been patched in versions 2.37.3 and 2.38.0. No known workarounds are available.
Metrics
Affected Vendors & Products
References
History
Thu, 19 Sep 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-09-19T14:18:10.146Z
Reserved: 2023-09-28T17:56:32.614Z
Link: CVE-2023-44399

Updated: 2024-08-02T20:07:32.937Z

Status : Modified
Published: 2023-10-10T17:15:13.107
Modified: 2024-11-21T08:25:49.450
Link: CVE-2023-44399

No data.