Security Advisory

ZAA-2021-01

· Please read carefully and check if the version of your Zammad system is affected by this vulnerability. Please send us information regarding vulnerabilities in Zammad!

Security Advisory Details

  • ID: ZAA-2021-01
  • Date: 03/16/2021
  • Title: Dependency 'activerecord-session_store' Timing Attack
  • Severity: medium
  • Product: Zammad 1.0.x up to 3.6.0
  • Fixed in: Zammad 3.5.1, 3.6.0
  • References:
    --> CVE: CVE-2019-25025

Vulnerability Descriptions

Dependency 'activerecord-session_store' Timing Attack

Zammad uses the 'activerecord-session_store' gem for session handling. The 'activerecord-session_store' (aka Active Record Session Store) component through 1.1.3 for Ruby on Rails does not use a constant-time approach when delivering information about whether a guessed session ID is valid. Consequently, remote attackers can leverage timing discrepancies to achieve a correct guess in a relatively short amount of time. This is a related issue to CVE-2019-16782.

This vulnerability is fixed in the latest versions of Zammad and it is recommended to upgrade to one of these.

Fixed releases can be found at:

Additional information

Online version of this advisory: https://zammad.com/en/advisories/zaa-2021-01

Send all remarks to security issues to security@zammad.com.

Signup
Together we turn your customers into fans.
Start free trial!
Newsletter
All releases and news directly in your inbox.
Subscribe to the newsletter