CVE-2023-22492

CVSS V2 None CVSS V3 None
Description
ZITADEL is a combination of Auth0 and Keycloak. RefreshTokens is an OAuth 2.0 feature that allows applications to retrieve new access tokens and refresh the user's session without the need for interacting with a UI. RefreshTokens were not invalidated when a user was locked or deactivated. The deactivated or locked user was able to obtain a valid access token only through a refresh token grant. When the locked or deactivated user’s session was already terminated (“logged out”) then it was not possible to create a new session. Renewal of access token through a refresh token grant is limited to the configured amount of time (RefreshTokenExpiration). As a workaround, ensure the RefreshTokenExpiration in the OIDC settings of your instance is set according to your security requirements. This issue has been patched in versions 2.17.3 and 2.16.4.
Overview
  • CVE ID
  • CVE-2023-22492
  • Assigner
  • security-advisories@github.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2023-01-11T20:15:08
  • Last Modified Date
  • 2023-01-24T18:21:59
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:* 1 OR 2.0.0 2.16.4
cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:* 1 OR 2.17.0 2.17.3
History
Created Old Value New Value Data Type Notes
2023-01-12 05:17:48 Added to TrackCVE
2023-01-12 05:17:50 Weakness Enumeration new
2023-01-12 14:15:16 2023-01-12T13:56:24 CVE Modified Date updated
2023-01-12 14:15:16 Received Awaiting Analysis Vulnerability Status updated
2023-01-18 16:16:13 Awaiting Analysis Undergoing Analysis Vulnerability Status updated
2023-01-24 19:14:05 2023-01-24T18:21:59 CVE Modified Date updated
2023-01-24 19:14:05 Undergoing Analysis Analyzed Vulnerability Status updated
2023-01-24 19:14:06 CPE Information updated