8000 chore(deps): update dependency zitadel/zitadel to v3.2.0 by uniget-bot · Pull Request #12493 · uniget-org/tools · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

chore(deps): update dependency zitadel/zitadel to v3.2.0 #12493

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
May 23, 2025

Conversation

uniget-bot
Copy link

This PR contains the following updates:

Package Update Change
zitadel/zitadel minor 3.1.0 -> 3.2.0

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


Release Notes

zitadel/zitadel (zitadel/zitadel)

v3.2.0

Compare Source

Features

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

Copy link
@nicholasdille-bot nicholasdille-bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Auto-approved because label type/renovate is present.

Copy link

🔍 Vulnerabilities of ghcr.io/uniget-org/tools/zitadel:3.2.0

📦 Image Reference ghcr.io/uniget-org/tools/zitadel:3.2.0
digestsha256:274d7546f5a7daa290f4557a63fb7876fa417d90d8f2679843a666d0804a1694
vulnerabilitiescritical: 0 high: 0 medium: 1 low: 0
platformlinux/amd64
size47 MB
packages211
critical: 0 high: 0 medium: 1 low: 0 github.com/gorilla/csrf 1.7.2 (golang)

pkg:golang/github.com/gorilla/csrf@1.7.2

medium 5.4: CVE--2025--24358 Cross-Site Request Forgery (CSRF)

Affected range<1.7.3
Fixed version1.7.3
CVSS Score5.4
CVSS VectorCVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P
Description

Summary

gorilla/csrf is vulnerable to CSRF via form submission from origins that share a top level domain with the target origin.

Details

gorilla/csrf does not validate the Origin header against an allowlist. Its executes its validation of the Referer header for cross-origin requests only when it believes the request is being served over TLS. It determines this by inspecting the r.URL.Scheme value. However, this value is never populated for "server" requests per the Go spec, and so this check does not run in practice.

	// URL specifies either the URI being requested (for server
	// requests) or the URL to access (for client requests).
	//
	// For server requests, the URL is parsed from the URI
	// supplied on the Request-Line as stored in RequestURI.  For
	// most requests, fields other than Path and RawQuery will be
	// empty. (See [RFC 7230, Section 5.3](https://rfc-editor.org/rfc/rfc7230.html#section-5.3))
	//
	// For client requests, the URL's Host specifies the server to
	// connect to, while the Request's Host field optionally
	// specifies the Host header value to send in the HTTP
	// request.
	URL *[url](https://pkg.go.dev/net/url).[URL](https://pkg.go.dev/net/url#URL)

PoC

  • create trusted origin target.example.test protected with gorilla/csrf and served over TLS hosting form on /submit
  • create attacker origin attack.example.test served over TLS
  • attacker exfiltrates token & cookie combination from target.example.test
  • attacker sets exfiltrated cookie with domain=.example.test and path=/submit
    • as the cookie has a more specific path than / (the default for CSRF cookies) it will be sent first by the browser on submit to our target origin
  • submit form from attack.example.test with exfiltrated CSRF form token
  • observe valid form submission as attack.example.test Origin / Referer headers are not validated.

Impact

This vulnerability allows an attacker who has gained XSS on a subdomain or top level domain to perform authenticated form submissions against gorilla/csrf protected targets that share the same top level domain.

This bug has existed in gorilla/csrf since its initial release in 2015.

Copy link

Attempting automerge. See https://github.com/uniget-org/tools/actions/runs/15215157592.

Copy link

PR is clean and can be merged. See https://github.com/uniget-org/tools/actions/runs/15215157592.

@github-actions github-actions bot merged commit 61d4da4 into main May 23, 2025
11 checks passed
@github-actions github-actions bot deleted the renovate/zitadel-zitadel-3.x branch May 23, 2025 16:43
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants
0