Zammad

Zammad

80 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.23%
  • Veröffentlicht 28.12.2020 08:15:11
  • Zuletzt bearbeitet 21.11.2024 05:19:04

An account-enumeration issue was discovered in Zammad before 3.4.1. The Create User functionality is implemented in a way that would enable an anonymous user to guess valid user email addresses. The application responds differently depending on wheth...

  • EPSS 0.19%
  • Veröffentlicht 16.06.2020 23:15:11
  • Zuletzt bearbeitet 21.11.2024 05:02:53

Zammad before 3.3.1, when Domain Based Assignment is enabled, relies on a claimed e-mail address for authorization decisions. An attacker can register a new account that will have access to all tickets of an arbitrary Organization.

  • EPSS 0.14%
  • Veröffentlicht 16.06.2020 23:15:11
  • Zuletzt bearbeitet 21.11.2024 05:02:52

In Zammad before 3.3.1, a Customer has ticket access that should only be available to an Agent (e.g., read internal data, split, or merge).

  • EPSS 0.36%
  • Veröffentlicht 05.03.2020 01:15:12
  • Zuletzt bearbeitet 21.11.2024 04:54:49

An issue was discovered in Zammad 3.0 through 3.2. It returns source code of static resources when submitting an OPTIONS request, rather than a GET request. Disclosure of source code allows for an attacker to formulate more precise attacks. Source co...

  • EPSS 0.32%
  • Veröffentlicht 05.03.2020 01:15:12
  • Zuletzt bearbeitet 21.11.2024 04:54:49

An issue was discovered in Zammad 3.0 through 3.2. After authentication, it transmits sensitive information to the user that may be compromised and used by an attacker to gain unauthorized access. Hashed passwords are returned to the user when visiti...

  • EPSS 0.4%
  • Veröffentlicht 05.03.2020 01:15:12
  • Zuletzt bearbeitet 21.11.2024 04:54:49

An XSS issue was discovered in Zammad 3.0 through 3.2. Malicious code can be provided by a low-privileged user through the File Upload functionality in Zammad. The malicious JavaScript will execute within the browser of any user who opens a specially...

  • EPSS 0.69%
  • Veröffentlicht 05.03.2020 01:15:11
  • Zuletzt bearbeitet 21.11.2024 04:54:48

An issue was discovered in Zammad 3.0 through 3.2. The WebSocket server crashes when messages in non-JSON format are sent by an attacker. The message format is not properly checked and parsing errors not handled. This leads to a crash of the service ...

  • EPSS 0.46%
  • Veröffentlicht 05.03.2020 01:15:11
  • Zuletzt bearbeitet 21.11.2024 04:54:48

An issue was discovered in Zammad 3.0 through 3.2. It does not prevent caching of confidential data within browser memory. An attacker who either remotely compromises or obtains physical access to a user's workstation can browse the browser cache con...

  • EPSS 0.36%
  • Veröffentlicht 05.03.2020 01:15:11
  • Zuletzt bearbeitet 21.11.2024 04:54:48

An issue was discovered in Zammad 3.0 through 3.2. It may respond with verbose error messages that disclose internal application or infrastructure information. This information could aid attackers in successfully exploiting other vulnerabilities.

  • EPSS 0.4%
  • Veröffentlicht 05.03.2020 01:15:11
  • Zuletzt bearbeitet 21.11.2024 04:54:48

An XSS issue was discovered in Zammad 3.0 through 3.2. Malicious code can be provided by a low-privileged user through the Email functionality. The malicious JavaScript will execute within the browser of any user who opens the Ticket with the Article...