Why teams of all sizes choose Zammad for structured, reliable support.
ZAA-2020-04
· Please read carefully and check if the version of your Zammad system is affected by this vulnerability. Please send us information regarding vulnerabilities in Zammad!
Security Advisory Details
- ID: ZAA-2020-04
- Date: 03/03/2020
- Title: Password Hashes Returned in Response of own session
- Severity: high
- Product: Zammad 1.0.x up to 3.2.0
- Fixed in: Zammad 3.2.1, 3.3.0
- References:
--> CVE: 2020-10104
Vulnerability Descriptions
Password Hashes Returned in Response of own session (CVE 2020-10104)
Zammad transmits sensitive information to the user after authentication that may be compromised and used by an attacker to gain unauthorized access. Hashed passwords are returned to the user when visiting a certain URL.
Special 🙏 and 🤘 and ❤️ to:
-
N: Guardian Project
-
N: Center for Digital Resilience
Recommended Resolution
This vulnerability is fixed in the latest versions of Zammad and it is recommended to upgrade to one of these.
Fixed releases can be found at:
- https://zammad.org/
- https://ftp.zammad.com/
Or just update your Zammad if installed via OS package manager.
Additional information
Online version of this advisory: https://zammad.com/en/advisories/zaa-2020-04
Send all remarks to security issues to security@zammad.com.