Unrestricted Upload of File with Dangerous Type Affecting github.com/zitadel/zitadel/internal/api/assets package, versions <2.42.17 >=2.43.0-rc.1 <2.43.11 >=2.44.0-rc.1 <2.44.7 >=2.45.0-rc.1 <2.45.5 >=2.46.0-rc.1 <2.46.5 >=2.47.0-rc.1 <2.47.8 >=2.48.0-rc.1 <2.48.3
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-GOLANG-GITHUBCOMZITADELZITADELINTERNALAPIASSETS-6509062
- published 28 Mar 2024
- disclosed 27 Mar 2024
- credit Amit Laish
Introduced: 27 Mar 2024
CVE-2024-29891 Open this link in a new tabHow to fix?
Upgrade github.com/zitadel/zitadel/internal/api/assets
to version 2.42.17, 2.43.11, 2.44.7, 2.45.5, 2.46.5, 2.47.8, 2.48.3 or higher.
Overview
Affected versions of this package are vulnerable to Unrestricted Upload of File with Dangerous Type by bypassing the ContentTypeAllowed()
function in asset.go
with a malicious avatar image upload. Files with MIME types not intended for use as avatar images are allowed. To be vulnerable, a different user needs to open the malicious file in a browser during an active ZITADEL session. This vulnerability was only produced on Firefox. Chrome, Safari, and Edge were not found to be vulnerable.