Total
67 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-50457 | 1 Zammad | 1 Zammad | 2024-02-05 | N/A | 4.3 MEDIUM |
An issue was discovered in Zammad before 6.2.0. When listing tickets linked to a knowledge base answer, or knowledge base answers of a ticket, a user could see entries for which they lack permissions. | |||||
CVE-2023-50454 | 1 Zammad | 1 Zammad | 2024-02-05 | N/A | 5.9 MEDIUM |
An issue was discovered in Zammad before 6.2.0. In several subsystems, SSL/TLS was used to establish connections to external services without proper validation of hostname and certificate authority. This is exploitable by man-in-the-middle attackers. | |||||
CVE-2023-50455 | 1 Zammad | 1 Zammad | 2024-02-05 | N/A | 7.5 HIGH |
An issue was discovered in Zammad before 6.2.0. Due to lack of rate limiting in the "email address verification" feature, an attacker could send many requests for a known address to cause Denial Of Service (generation of many emails, which would also spam the victim). | |||||
CVE-2023-50453 | 1 Zammad | 1 Zammad | 2024-02-05 | N/A | 5.3 MEDIUM |
An issue was discovered in Zammad before 6.2.0. It uses the public endpoint /api/v1/signshow for its login screen. This endpoint returns internal configuration data of user object attributes, such as selectable values, which should not be visible to the public. | |||||
CVE-2023-50456 | 1 Zammad | 1 Zammad | 2024-02-05 | N/A | 5.3 MEDIUM |
An issue was discovered in Zammad before 6.2.0. An attacker can trigger phishing links in generated notification emails via a crafted first or last name. | |||||
CVE-2023-29867 | 1 Zammad | 1 Zammad | 2024-02-04 | N/A | 6.5 MEDIUM |
Zammad 5.3.x (Fixed 5.4.0) is vulnerable to Incorrect Access Control. An authenticated attacker could gain information about linked accounts of users involved in their tickets using the Zammad API. | |||||
CVE-2023-31597 | 1 Zammad | 1 Zammad | 2024-02-04 | N/A | 6.5 MEDIUM |
An issue in Zammad v5.4.0 allows attackers to bypass e-mail verification using an arbitrary address and manipulate the data of the generated user. Attackers are also able to gain unauthorized access to existing tickets. | |||||
CVE-2023-29868 | 1 Zammad | 1 Zammad | 2024-02-04 | N/A | 6.5 MEDIUM |
Zammad 5.3.x (Fixed in 5.4.0) is vulnerable to Incorrect Access Control. An authenticated attacker with agent and customer roles could perform unauthorized changes on articles where they only have customer permissions. | |||||
CVE-2022-35490 | 1 Zammad | 1 Zammad | 2024-02-04 | N/A | 9.8 CRITICAL |
Zammad 5.2.0 is vulnerable to privilege escalation. Zammad has a prevention against brute-force attacks trying to guess login credentials. After a configurable amount of attempts, users are invalidated and logins prevented. An attacker might work around this prevention, enabling them to send more than the configured amount of requests before the user invalidation takes place. | |||||
CVE-2022-40816 | 1 Zammad | 1 Zammad | 2024-02-04 | N/A | 6.5 MEDIUM |
Zammad 5.2.1 is vulnerable to Incorrect Access Control. Zammad's asset handling mechanism has logic to ensure that customer users are not able to see personal information of other users. This logic was not effective when used through a web socket connection, so that a logged-in attacker would be able to fetch personal data of other users by querying the Zammad API. This issue is fixed in , 5.2.2. | |||||
CVE-2022-35489 | 1 Zammad | 1 Zammad | 2024-02-04 | N/A | 6.5 MEDIUM |
In Zammad 5.2.0, customers who have secondary organizations assigned were able to see all organizations of the system rather than only those to which they are assigned. | |||||
CVE-2022-35487 | 1 Zammad | 1 Zammad | 2024-02-04 | N/A | 7.5 HIGH |
Zammad 5.2.0 suffers from Incorrect Access Control. Zammad did not correctly perform authorization on certain attachment endpoints. This could be abused by an unauthenticated attacker to gain access to attachments, such as emails or attached files. | |||||
CVE-2022-35488 | 1 Zammad | 1 Zammad | 2024-02-04 | N/A | 7.5 HIGH |
In Zammad 5.2.0, an attacker could manipulate the rate limiting in the 'forgot password' feature of Zammad, and thereby send many requests for a known account to cause Denial Of Service by many generated emails which would also spam the victim. | |||||
CVE-2022-27332 | 1 Zammad | 1 Zammad | 2024-02-04 | 5.8 MEDIUM | 9.1 CRITICAL |
An access control issue in Zammad v5.0.3 allows attackers to write entries to the CTI caller log without authentication. This vulnerability can allow attackers to execute phishing attacks or cause a Denial of Service (DoS). | |||||
CVE-2022-27331 | 1 Zammad | 1 Zammad | 2024-02-04 | 4.0 MEDIUM | 4.3 MEDIUM |
An access control issue in Zammad v5.0.3 broadcasts administrative configuration changes to all users who have an active application instance, including settings that should only be visible to authenticated users. | |||||
CVE-2022-29700 | 1 Zammad | 1 Zammad | 2024-02-04 | 5.0 MEDIUM | 7.5 HIGH |
A lack of password length restriction in Zammad v5.1.0 allows for the creation of extremely long passwords which can cause a Denial of Service (DoS) during password verification. | |||||
CVE-2022-29701 | 1 Zammad | 1 Zammad | 2024-02-04 | 5.0 MEDIUM | 7.5 HIGH |
A lack of rate limiting in the 'forgot password' feature of Zammad v5.1.0 allows attackers to send an excessive amount of reset requests for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages. | |||||
CVE-2021-42093 | 1 Zammad | 1 Zammad | 2024-02-04 | 6.5 MEDIUM | 7.2 HIGH |
An issue was discovered in Zammad before 4.1.1. An admin can execute code on the server via a crafted request that manipulates triggers. | |||||
CVE-2021-42137 | 1 Zammad | 1 Zammad | 2024-02-04 | 5.0 MEDIUM | 5.3 MEDIUM |
An issue was discovered in Zammad before 5.0.1. In some cases, there is improper enforcement of the privilege requirement for viewing a list of tickets that shows title, state, etc. | |||||
CVE-2021-42091 | 1 Zammad | 1 Zammad | 2024-02-04 | 6.4 MEDIUM | 9.1 CRITICAL |
An issue was discovered in Zammad before 4.1.1. SSRF can occur via GitHub or GitLab integration. |