ZAA-2020-15
· Please read carefully and check if the version of your Zammad system is affected by this vulnerability. Please send us information regarding vulnerabilities in Zammad!
· Please read carefully and check if the version of your Zammad system is affected by this vulnerability. Please send us information regarding vulnerabilities in Zammad!
The Zammad application's SMS configuration interface for Massenversand is implemented in a way that it renders the result of the test request to the User. An attacker can use this to request any URL via a GET request from the network interface of the server. This may lead to disclosure of information from internal systems.
Special 🙏 and 🤘 and ❤️ to:
This vulnerability is fixed in the latest versions of Zammad and it is recommended to upgrade to one of these.
Fixed releases can be found at:
Online version of this advisory: https://zammad.com/en/advisories/zaa-2020-15
Send all remarks to security issues to security@zammad.com.