In Zammad before 6.3.1, a Ruby gem bundled by Zammad is installed with world-writable file permissions. This allowed a local attacker on the server to modify the gem's files, injecting arbitrary code into Zammad processes (which run with the environment and permissions of the Zammad user).
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://zammad.com/en/advisories/zaa-2024-04 |
![]() ![]() |
History
Tue, 15 Apr 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:zammad:zammad:6.3.0:-:*:*:*:*:*:* cpe:2.3:a:zammad:zammad:6.3.0:alpha:*:*:*:*:*:* |
Thu, 13 Feb 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Zammad
Zammad zammad |
|
CPEs | cpe:2.3:a:zammad:zammad:*:*:*:*:*:*:*:* | |
Vendors & Products |
Zammad
Zammad zammad |
|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-13T15:59:16.611Z
Reserved: 2024-05-19T00:00:00.000Z
Link: CVE-2024-36078

Updated: 2024-08-02T03:30:12.520Z

Status : Analyzed
Published: 2024-05-19T20:15:08.043
Modified: 2025-04-15T16:38:03.093
Link: CVE-2024-36078

No data.