In Zammad before 6.3.1, a Ruby gem bundled by Zammad is installed with world-writable file permissions. This allowed a local attacker on the server to modify the gem's files, injecting arbitrary code into Zammad processes (which run with the environment and permissions of the Zammad user).
History

Thu, 13 Feb 2025 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Zammad
Zammad zammad
CPEs cpe:2.3:a:zammad:zammad:*:*:*:*:*:*:*:*
Vendors & Products Zammad
Zammad zammad
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-02-13T15:59:16.611Z

Reserved: 2024-05-19T00:00:00.000Z

Link: CVE-2024-36078

cve-icon Vulnrichment

Updated: 2024-08-02T03:30:12.520Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-19T20:15:08.043

Modified: 2024-11-21T09:21:35.850

Link: CVE-2024-36078

cve-icon Redhat

No data.