CVE-2022-40816
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Zammad 5.2.1 is vulnerable to Incorrect Access Control. Zammad's asset handling mechanism has logic to ensure that customer users are not able to see personal information of other users. This logic was not effective when used through a web socket connection, so that a logged-in attacker would be able to fetch personal data of other users by querying the Zammad API. This issue is fixed in , 5.2.2.
Zammad versión 5.2.1, es vulnerable a un Control de Acceso Incorrecto. El mecanismo de manejo de activos de Zammad presenta una lógica para asegurar que los usuarios clientes no puedan visualizar la información personal de otros usuarios. Esta lógica no era efectiva cuando era usada mediante una conexión de socket web, por lo que un atacante que hubiera iniciado sesión podríaconseguir datos personales de otros usuarios consultando la API de Zammad. Este problema ha sido corregido en versión 5.2.2
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-09-19 CVE Reserved
- 2022-09-27 CVE Published
- 2024-04-19 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-863: Incorrect Authorization
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://zammad.com/de/advisories/zaa-2022-09 | 2023-08-08 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Zammad Search vendor "Zammad" | Zammad Search vendor "Zammad" for product "Zammad" | >= 5.2.0 < 5.2.2 Search vendor "Zammad" for product "Zammad" and version " >= 5.2.0 < 5.2.2" | - |
Affected
|