Please read carefully and check if the version of your Zammad system is affected by this vulnerability. Please send information regarding vulnerabilities in Zammad to: security at zammad.com
The Zammad application's SMS configuration interface for Massenversand is implemented in a way that it renders the result of the test request to the User. An attacker can use this to request any URL via a GET request from the network interface of the server. This may lead to disclosure of information from internal systems.
Special 🙏 and 🤘 and ❤️ to:
N: Michał Błaszczak
C: Zdalny Admln
This vulnerability is fixed in the latest versions of Zammad and it is recommended to upgrade to one of these.
Fixed releases can be found at:
Or just update your Zammad if installed via OS package manager.
Online version of this advisory: https://zammad.com/news/security-advisory-zaa-2020-15
Send all remarks to security issues to security @ zammad.com.