CVE-2024-32967

5.3 MEDIUM

📋 TL;DR

Zitadel identity management system versions before patched releases could expose database connection details (database name, username, hostname) to users when database connectivity fails. This information disclosure vulnerability affects all Zitadel deployments with database connectivity issues. Users of affected versions are vulnerable until they upgrade.

💻 Affected Systems

Products:
  • Zitadel
Versions: All versions before v2.45.7, v2.46.7, v2.47.10, v2.48.5
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers only when Zitadel cannot connect to its database.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain database credentials and host information, potentially leading to database compromise, data exfiltration, or lateral movement to database servers.

🟠

Likely Case

Database connection information is exposed to users during database outages, revealing infrastructure details that could aid targeted attacks.

🟢

If Mitigated

No sensitive information is exposed; users receive generic error messages without infrastructure details.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires causing or waiting for database connectivity failure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2.45.7, v2.46.7, v2.47.10, or v2.48.5

Vendor Advisory: https://github.com/zitadel/zitadel/releases

Restart Required: Yes

Instructions:

1. Identify current Zitadel version. 2. Upgrade to appropriate patched version based on your release branch. 3. Restart Zitadel service.

🔧 Temporary Workarounds

No workaround available

all

Vendor states no workaround exists; patch is required.

🧯 If You Can't Patch

  • Ensure database connectivity is highly reliable with redundancy to minimize outage windows.
  • Implement network segmentation to isolate database servers from potential attackers.

🔍 How to Verify

Check if Vulnerable:

Check Zitadel version against affected versions list; test by simulating database connectivity failure and observing error responses.

Check Version:

Check Zitadel version via web interface or configuration files; exact command depends on deployment method.

Verify Fix Applied:

After upgrade, simulate database connectivity failure and confirm error messages no longer contain database connection details.

📡 Detection & Monitoring

Log Indicators:

  • Error logs containing database connection failure messages with exposed credentials or hostnames
  • Unusual database connectivity errors followed by user access

Network Indicators:

  • Increased error responses from Zitadel during database outages

SIEM Query:

source="zitadel" AND (error OR failure) AND (database OR db) AND (credentials OR hostname OR username)

🔗 References

📤 Share & Export