Why teams of all sizes choose Zammad for structured, reliable support.
ZAA-2020-17
· Please read carefully and check if the version of your Zammad system is affected by this vulnerability. Please send us information regarding vulnerabilities in Zammad!
Security Advisory Details
- ID: ZAA-2020-17
- Date: 09/22/2020
- Title: Tag and Link REST API endpoints lack CSRF token check
- Severity: low
- Product: Zammad 1.0.x up to 3.4.0
- Fixed in: Zammad 3.4.1, 3.5.0
- References:
--> CVE: Pending
Vulnerability Descriptions
Tag and Link REST API endpoints lack CSRF token check
The add and delete REST API endpoints for Tags and Links were requested via GET requests. Therefore no CSRF token checks were performed. Because of that an attacker could add or delete Tags and Links from a user that the web application trusts.
Special 🙏 and 🤘 and ❤️ to:
- N: Michał Błaszczak
- W: http://blaszczakm.blogspot.com/
- T: https://twitter.com/w4cky_
- F: https://www.facebook.com/blaszczakm
- L: https://www.linkedin.com/in/micha%C5%82-b%C5%82aszczak-sec/
- C: Zdalny Admln
- C-F: https://www.facebook.com/ZDALNYADMIN
- C-W: https://remoteadmin.store/
- C-T: https://twitter.com/ZdalnyA
- C-L: https://www.linkedin.com/company/zdalnyadmin/
Recommended Resolution
This vulnerability is fixed in the latest versions of Zammad and it is recommended to upgrade to one of these.
Fixed releases can be found at:
- https://zammad.org/
- https://ftp.zammad.com/
Or just update your Zammad if installed via OS package manager.
Additional information
Online version of this advisory: https://zammad.com/en/advisories/zaa-2020-17
Send all remarks to security issues to security@zammad.com.