CVE-2023-22492: Insufficient Session Expiration
ZITADEL is a combination of Auth0 and Keycloak. RefreshTokens is an OAuth 2.0 feature that allows applications to retrieve new access tokens and refresh the user’s session without the need for interacting with a UI. RefreshTokens were not invalidated when a user was locked or deactivated. The deactivated or locked user was able to obtain a valid access token only through a refresh token grant. When the locked or deactivated user’s session was already terminated (“logged out”) then it was not possible to create a new session. Renewal of access token through a refresh token grant is limited to the configured amount of time (RefreshTokenExpiration). As a workaround, ensure the RefreshTokenExpiration in the OIDC settings of your instance is set according to your security requirements. This issue has been patched in versions 2.17.3 and 2.16.4.
References
- github.com/advisories/GHSA-6rrr-78xp-5jp8
- github.com/zitadel/zitadel/commit/301e22c4956ead6014a8179463c37263f7301a83
- github.com/zitadel/zitadel/commit/fc892c52a10cd4ffdac395747494f3a93a7494c2
- github.com/zitadel/zitadel/releases/tag/v2.16.4
- github.com/zitadel/zitadel/releases/tag/v2.17.3
- github.com/zitadel/zitadel/security/advisories/GHSA-6rrr-78xp-5jp8
- nvd.nist.gov/vuln/detail/CVE-2023-22492
Detect and mitigate CVE-2023-22492 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →