warum Teams jeder Größe Zammad für strukturierten, zuverlässigen Support wählen.
ZAA-2021-01
· Please read carefully and check if the version of your Zammad system is affected by this vulnerability. Please send us information regarding vulnerabilities in Zammad!
Security Advisory Details
- ID: ZAA-2021-01
- Date: 03/16/2021
- Title: Dependency 'activerecord-session_store' Timing Attack
- Severity: medium
- Product: Zammad 1.0.x up to 3.6.0
- Fixed in: Zammad 3.5.1, 3.6.0
- References:
--> CVE: CVE-2019-25025
Vulnerability Descriptions
Dependency 'activerecord-session_store' Timing Attack
Zammad uses the 'activerecord-session_store' gem for session handling. The 'activerecord-session_store' (aka Active Record Session Store) component through 1.1.3 for Ruby on Rails does not use a constant-time approach when delivering information about whether a guessed session ID is valid. Consequently, remote attackers can leverage timing discrepancies to achieve a correct guess in a relatively short amount of time. This is a related issue to CVE-2019-16782.
Recommended Resolution
This vulnerability is fixed in the latest versions of Zammad and it is recommended to upgrade to one of these.
Fixed releases can be found at:
- https://zammad.org/
- https://ftp.zammad.com/
Or just update your Zammad if installed via OS package manager.
Additional information
Online version of this advisory: https://zammad.com/en/advisories/zaa-2021-01
Send all remarks to security issues to security@zammad.com.