In Zammad before 6.3.1, a Ruby gem bundled by Zammad is installed with world-writable file permissions. This allowed a local attacker on the server to modify the gem's files, injecting arbitrary code into Zammad processes (which run with the environment and permissions of the Zammad user).
History

Tue, 15 Apr 2025 17:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:zammad:zammad:6.3.0:-:*:*:*:*:*:*
cpe:2.3:a:zammad:zammad:6.3.0:alpha:*:*:*:*:*:*

Thu, 13 Feb 2025 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Zammad
Zammad zammad
CPEs cpe:2.3:a:zammad:zammad:*:*:*:*:*:*:*:*
Vendors & Products Zammad
Zammad zammad
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-02-13T15:59:16.611Z

Reserved: 2024-05-19T00:00:00.000Z

Link: CVE-2024-36078

cve-icon Vulnrichment

Updated: 2024-08-02T03:30:12.520Z

cve-icon NVD

Status : Analyzed

Published: 2024-05-19T20:15:08.043

Modified: 2025-04-15T16:38:03.093

Link: CVE-2024-36078

cve-icon Redhat

No data.