warum Teams jeder Größe Zammad für strukturierten, zuverlässigen Support wählen.
ZAA-2020-15
· Please read carefully and check if the version of your Zammad system is affected by this vulnerability. Please send us information regarding vulnerabilities in Zammad!
Security Advisory Details
- ID: ZAA-2020-15
- Date: 09/22/2020
- Title: Application Functionality Can Be Used to perform Server-Side Request Forgery
- Severity: medium
- Product: Zammad 1.0.x up to 3.4.0
- Fixed in: Zammad 3.4.1, 3.5.0
- References:
--> CVE: 2020-26032
Vulnerability Descriptions
Application Functionality Can Be Used to perform Server-Side Request Forgery
The Zammad application's SMS configuration interface for Massenversand is implemented in a way that it renders the result of the test request to the User. An attacker can use this to request any URL via a GET request from the network interface of the server. This may lead to disclosure of information from internal systems.
Special 🙏 and 🤘 and ❤️ to:
- N: Michał Błaszczak
- W: http://blaszczakm.blogspot.com/
- T: https://twitter.com/w4cky_
- F: https://www.facebook.com/blaszczakm
- L: https://www.linkedin.com/in/micha%C5%82-b%C5%82aszczak-sec/
- C: Zdalny Admln
- C-F: https://www.facebook.com/ZDALNYADMIN
- C-W: https://remoteadmin.store/
- C-T: https://twitter.com/ZdalnyA
- C-L: https://www.linkedin.com/company/zdalnyadmin/
Recommended Resolution
This vulnerability is fixed in the latest versions of Zammad and it is recommended to upgrade to one of these.
Fixed releases can be found at:
- https://zammad.org/
- https://ftp.zammad.com/
Or just update your Zammad if installed via OS package manager.
Additional information
Online version of this advisory: https://zammad.com/en/advisories/zaa-2020-15
Send all remarks to security issues to security@zammad.com.