Insufficient Session Expiration Affecting github.com/zitadel/zitadel/internal package, versions >=2.0.0 <2.16.4>=2.17.0 <2.17.3


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.11% (46th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Insufficient Session Expiration vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-GOLANG-GITHUBCOMZITADELZITADELINTERNAL-3228585
  • published12 Jan 2023
  • disclosed11 Jan 2023
  • creditSebastian Büchler

Introduced: 11 Jan 2023

CVE-2023-22492  (opens in a new tab)
CWE-613  (opens in a new tab)

How to fix?

Upgrade github.com/zitadel/zitadel/internal to version 2.16.4, 2.17.3 or higher.

Overview

Affected versions of this package are vulnerable to Insufficient Session Expiration such that RefreshTokens parameter is not invalidated when a user is locked or deactivated. The deactivated or locked user is able to obtain a valid access token only through a refresh token grant. If the locked or deactivated user’s session is already terminated (“logged out”) then it is not possible to create a new session. Renewal of access token through a refresh token grant is limited to the configured amount of time (RefreshTokenExpiration).

Workaround

Ensure the RefreshTokenExpiration in the OIDC settings is set according to the user's security requirements.

CVSS Scores

version 3.1