Headline
CVE-2023-31597: Security Advisory ZAA-2023-03 | Zammad
An issue in Zammad v5.4.0 allows attackers to bypass e-mail verification using an arbitrary address and manipulate the data of the generated user. Attackers are also able to gain unauthorized access to existing tickets.
Security Advisory
12. April 2023 · Please read carefully and check if the version of your Zammad system is affected by this vulnerability. Please send us information regarding vulnerabilities in Zammad!
Security Advisory Details
- ID: ZAA-2023-03
- Date: 2023-04-12
- Title: Unauthorized Access
- Severity: critical
- Product: Zammad 5.4.x
- Fixed in: Zammad 5.4.1
- References:
–> pending CVE assignment
Vulnerability Descriptions****Unauthorized Access
An attacker could send manipulated data to the Zammad API to sign up with an arbitrary email address, bypassing the email verification step and manipulating the data of the generated user. In some scenarios this could lead to gaining unauthorized access to existing tickets.
Special 🙏 and 🤘 and ❤️ to:
- N: siavash bahrami
- W: https://github.com/siavashbahrami
Recommended Resolution
This vulnerability is fixed in the latest versions of Zammad and it is recommended to upgrade to one of these.
Fixed releases can be found at:
- https://zammad.org/
- https://ftp.zammad.com/
Or just update your Zammad if installed via OS package manager.
Additional information
Online version of this advisory: https://zammad.com/en/advisories/zaa-2023-03
Please send remarks on security issues exclusively to [email protected].