CVE-2024-49753

5.9 MEDIUM

📋 TL;DR

This vulnerability in Zitadel identity infrastructure software allows attackers to bypass URL validation restrictions and send requests to localhost (127.0.0.1) by using DNS records that resolve to that address. This could enable unauthorized access to internal endpoints that may contain sensitive information or functionality. All Zitadel users running affected versions are vulnerable.

💻 Affected Systems

Products:
  • Zitadel
Versions: All versions prior to 2.64.1, 2.63.6, 2.62.8, 2.61.4, 2.60.4, 2.59.5, and 2.58.7
Operating Systems: All platforms running Zitadel
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using Zitadel actions with URL validation enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain access to unsecured internal endpoints on localhost, potentially accessing sensitive data, administrative functions, or exploiting other local services.

🟠

Likely Case

Limited information disclosure from internal endpoints that lack proper authentication, potentially exposing configuration data or internal service information.

🟢

If Mitigated

If internal endpoints are properly secured with authentication and network segmentation, impact is limited to failed connection attempts.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires ability to control DNS resolution and knowledge of internal endpoints. Exploitation depends on what unsecured services are running on localhost.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.64.1, 2.63.6, 2.62.8, 2.61.4, 2.60.4, 2.59.5, or 2.58.7

Vendor Advisory: https://github.com/zitadel/zitadel/releases

Restart Required: Yes

Instructions:

1. Identify your current Zitadel version. 2. Upgrade to the appropriate patched version for your release track. 3. Restart Zitadel services. 4. Verify the fix is applied.

🧯 If You Can't Patch

  • Disable Zitadel actions functionality if not required
  • Implement network-level restrictions to block outbound connections from Zitadel to localhost

🔍 How to Verify

Check if Vulnerable:

Check Zitadel version against affected versions list. If using affected version and actions feature is enabled, system is vulnerable.

Check Version:

Check Zitadel admin interface or deployment configuration for version information.

Verify Fix Applied:

Verify Zitadel version is 2.64.1, 2.63.6, 2.62.8, 2.61.4, 2.60.4, 2.59.5, or 2.58.7 or later.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound connection attempts from Zitadel to localhost addresses
  • Failed URL validation attempts in action logs

Network Indicators:

  • Outbound connections from Zitadel to 127.0.0.1 or localhost
  • DNS queries for domains that resolve to localhost

SIEM Query:

source="zitadel" AND (destination_ip="127.0.0.1" OR hostname="localhost")

🔗 References

📤 Share & Export