Security Advisory

ZAA-2020-15

· Please read carefully and check if the version of your Zammad system is affected by this vulnerability. Please send us information regarding vulnerabilities in Zammad!

Security Advisory Details

  • ID: ZAA-2020-15
  • Date: 09/22/2020
  • Title: Application Functionality Can Be Used to perform Server-Side Request Forgery
  • Severity: medium
  • Product: Zammad 1.0.x up to 3.4.0
  • Fixed in: Zammad 3.4.1, 3.5.0
  • References:
    --> CVE: Pending

Vulnerability Descriptions

Application Functionality Can Be Used to perform Server-Side Request Forgery

The Zammad application's SMS configuration interface for Massenversand is implemented in a way that it renders the result of the test request to the User. An attacker can use this to request any URL via a GET request from the network interface of the server. This may lead to disclosure of information from internal systems.

Special 🙏 and 🤘 and ❤️ to:

This vulnerability is fixed in the latest versions of Zammad and it is recommended to upgrade to one of these.

Fixed releases can be found at:

Additional information

Online version of this advisory: https://zammad.com/en/advisories/zaa-2020-15

Send all remarks to security issues to security@zammad.com.

Signup
Together we turn your customers into fans.
Start free trial!
Newsletter
All releases and news directly in your inbox.
Subscribe to the newsletter