{ "schema_version": "1.4.0", "id": "GHSA-6rrr-78xp-5jp8", "modified": "2023-01-24T18:55:45Z", "published": "2023-01-11T18:27:48Z", "aliases": [ "CVE-2023-22492" ], "summary": "Zitadel RefreshToken invalidation vulnerability", "details": "### Impact\nRefreshTokens is an OAuth 2.0 feature that allows applications to retrieve new access tokens and refresh the user's session without the need for interacting with a UI.\n\nRefreshTokens were not invalidated when a user was locked or deactivated. The deactivated or locked user was able to obtain a valid access token only through a refresh token grant.\n\nWhen the locked or deactivated user’s session was already terminated (“logged out”) then it was not possible to create a new session. Renewal of access token through a refresh token grant is limited to the configured amount of time (RefreshTokenExpiration).\n\n### Patches\n2.x versions are fixed on >= [2.17.3](https://github.com/zitadel/zitadel/releases/tag/v2.17.3)\n2.16.x versions are fixed on >= [2.16.4](https://github.com/zitadel/zitadel/releases/tag/v2.16.4)\n\nZITADEL recommends upgrading to the latest versions available in due course.\n\n### Workarounds\nEnsure the RefreshTokenExpiration in the OIDC settings of your instance is set according to your security requirements.\n\n### References\n\nhttps://zitadel.com/docs/guides/manage/console/instance-settings#oidc-token-lifetimes-and-expiration\n", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:N" } ], "affected": [ { "package": { "ecosystem": "Go", "name": "github.com/zitadel/zitadel" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.17.0" }, { "fixed": "2.17.3" } ] } ] }, { "package": { "ecosystem": "Go", "name": "github.com/zitadel/zitadel" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "2.0.0" }, { "fixed": "2.16.4" } ] } ] } ], "references": [ { "type": "WEB", "url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-6rrr-78xp-5jp8" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-22492" }, { "type": "WEB", "url": "https://github.com/zitadel/zitadel/commit/301e22c4956ead6014a8179463c37263f7301a83" }, { "type": "WEB", "url": "https://github.com/zitadel/zitadel/commit/fc892c52a10cd4ffdac395747494f3a93a7494c2" }, { "type": "PACKAGE", "url": "https://github.com/zitadel/zitadel" }, { "type": "WEB", "url": "https://github.com/zitadel/zitadel/releases/tag/v2.16.4" }, { "type": "WEB", "url": "https://github.com/zitadel/zitadel/releases/tag/v2.17.3" } ], "database_specific": { "cwe_ids": [ "CWE-613" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2023-01-11T18:27:48Z", "nvd_published_at": "2023-01-11T20:15:00Z" } }