Security Advisory

ZAA-2020-07

· Please read carefully and check if the version of your Zammad system is affected by this vulnerability. Please send us information regarding vulnerabilities in Zammad!

Security Advisory Details

  • ID: ZAA-2020-07
  • Date: 03/03/2020
  • Title: Application Functionality Can Be Used to Determine Existing User Accounts
  • Severity: medium
  • Product: Zammad 1.0.x up to 3.2.0
  • Fixed in: Zammad 3.2.1, 3.3.0
  • References:
    --> CVE: 2020-10102

Vulnerability Descriptions

Application Functionality Can Be Used to Determine Existing User Accounts (CVE 2020-10102)

The Zammad application's Forgot Password functionality is implemented in a way that would enable an anonymous user to guess valid user emails. In the current implementation, the application responds differently depending on whether the input supplied was recognized as associated with a valid user or not. This behavior could be used as part of a two-stage automated attack. During the first stage, an attacker would iterate through a list of account names to determine which correspond with valid accounts. During the second stage, the attacker would use a list of common passwords to attempt to brute force credentials for accounts that were recognized by the system in the first stage.

Special 🙏 and 🤘 and ❤️ to:

Recommended Resolution

This vulnerability is fixed in the latest versions of Zammad and it is recommended to upgrade to one of these.

Fixed releases can be found at:

Additional information

Online version of this advisory: https://zammad.com/en/advisories/zaa-2020-07

Send all remarks to security issues to security@zammad.com.

Signup
Together we turn your customers into fans.
Start free trial!
Newsletter
All releases and news directly in your inbox.
Subscribe to the newsletter