Zammad

Zammad

80 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.17%
  • Veröffentlicht 27.09.2022 23:15:16
  • Zuletzt bearbeitet 21.05.2025 15:16:01

Zammad 5.2.1 has a fine-grained permission model that allows to configure read-only access to tickets. However, agents were still wrongly able to perform some operations on such tickets, like adding and removing links, tags. and related answers. This...

  • EPSS 0.21%
  • Veröffentlicht 27.09.2022 23:15:16
  • Zuletzt bearbeitet 21.05.2025 15:16:00

Zammad 5.2.1 is vulnerable to Incorrect Access Control. Zammad's asset handling mechanism has logic to ensure that customer users are not able to see personal information of other users. This logic was not effective when used through a web socket con...

  • EPSS 0.41%
  • Veröffentlicht 08.08.2022 14:15:10
  • Zuletzt bearbeitet 21.11.2024 07:11:14

Zammad 5.2.0 is vulnerable to privilege escalation. Zammad has a prevention against brute-force attacks trying to guess login credentials. After a configurable amount of attempts, users are invalidated and logins prevented. An attacker might work aro...

  • EPSS 0.33%
  • Veröffentlicht 08.08.2022 14:15:10
  • Zuletzt bearbeitet 21.11.2024 07:11:14

In Zammad 5.2.0, customers who have secondary organizations assigned were able to see all organizations of the system rather than only those to which they are assigned.

  • EPSS 0.39%
  • Veröffentlicht 08.08.2022 14:15:10
  • Zuletzt bearbeitet 21.11.2024 07:11:14

In Zammad 5.2.0, an attacker could manipulate the rate limiting in the 'forgot password' feature of Zammad, and thereby send many requests for a known account to cause Denial Of Service by many generated emails which would also spam the victim.

  • EPSS 0.81%
  • Veröffentlicht 08.08.2022 14:15:10
  • Zuletzt bearbeitet 21.11.2024 07:11:14

Zammad 5.2.0 suffers from Incorrect Access Control. Zammad did not correctly perform authorization on certain attachment endpoints. This could be abused by an unauthenticated attacker to gain access to attachments, such as emails or attached files.

  • EPSS 0.46%
  • Veröffentlicht 27.04.2022 03:15:39
  • Zuletzt bearbeitet 21.11.2024 06:59:35

A lack of rate limiting in the 'forgot password' feature of Zammad v5.1.0 allows attackers to send an excessive amount of reset requests for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messa...

  • EPSS 0.26%
  • Veröffentlicht 27.04.2022 03:15:39
  • Zuletzt bearbeitet 21.11.2024 06:55:35

An access control issue in Zammad v5.0.3 broadcasts administrative configuration changes to all users who have an active application instance, including settings that should only be visible to authenticated users.

  • EPSS 0.43%
  • Veröffentlicht 27.04.2022 03:15:39
  • Zuletzt bearbeitet 21.11.2024 06:55:35

An access control issue in Zammad v5.0.3 allows attackers to write entries to the CTI caller log without authentication. This vulnerability can allow attackers to execute phishing attacks or cause a Denial of Service (DoS).

  • EPSS 0.39%
  • Veröffentlicht 27.04.2022 03:15:39
  • Zuletzt bearbeitet 21.11.2024 06:59:35

A lack of password length restriction in Zammad v5.1.0 allows for the creation of extremely long passwords which can cause a Denial of Service (DoS) during password verification.