arrow-left arrow-right autosave chat checkmark close dashboard fields fingerprint flash hamburger language list lock logotype long-arrow-right marker migrate overviews phone rocket search smiley stamp star stopwatch team twitter

Please read carefully and check if the version of your Zammad system is affected by this vulnerability. Please send information regarding vulnerabilities in Zammad to: security at zammad.com

Security Advisory Details

Vulnerability Descriptions

Persistent Cross-Site Scripting - File Upload (XSS) (CVE 2020-10103)

Malicious code can be provided by a low-privileged user through the File Upload functionality in Zammad. The malicious JavaScript will execute within the browser of any user who opens a specially crafted link to the uploaded file with an active Zammad session.

Special 🙏 and 🤘 and ❤️ to:

N: TÜV Rheinland i-sec GmbH
D: Security Researcher
W: https://www.tuv.com

N: Guardian Project
W: https://guardianproject.info

N: Center for Digital Resilience
W: https://digiresilience.org

N: James Kettle
D: Director of Research at PortSwigger Web Security aka @Burp_Suite
W: https://portswigger.net

Recommended Resolution

This vulnerability is fixed in the latest versions of Zammad and it is recommended to upgrade to one of these.

Fixed releases can be found at:

Or just update your Zammad if installed via OS package manager.

Additional information

Online version of this advisory: https://zammad.com/news/security-advisory-zaa-2020-02

Send all remarks to security issues to security @ zammad.com.