{"uuid": "07a95221-039b-42fd-b8d7-89d945a8d058", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49757", "type": "seen", "source": "https://t.me/cvedetector/8949", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-49757 - Zitadel Unauthenticated User Registration\", \n  \"Content\": \"CVE ID : CVE-2024-49757 \nPublished : Oct. 25, 2024, 3:15 p.m. | 29\u00a0minutes ago \nDescription : The open-source identity infrastructure software Zitadel allows administrators to disable the user self-registration. Due to a missing security check in versions prior to 2.64.0, 2.63.5, 2.62.7, 2.61.4, 2.60.4, 2.59.5, and 2.58.7, disabling the \"User Registration allowed\" option only hid the registration button on the login page. Users could bypass this restriction by directly accessing the registration URL (/ui/login/loginname) and register a user that way. Versions 2.64.0, 2.63.5, 2.62.7, 2.61.4, 2.60.4, 2.59.5, and 2.58.7 contain a patch. No known workarounds are available. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-25T17:55:12.000000Z"}