In Zammad before 6.3.1, a Ruby gem bundled by Zammad is installed with world-writable file permissions. This allowed a local attacker on the server to modify the gem's files, injecting arbitrary code into Zammad processes (which run with the environment and permissions of the Zammad user).
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://zammad.com/en/advisories/zaa-2024-04 |
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-02T03:30:12.520Z
Reserved:
Link: CVE-2024-36078
Vulnrichment
Updated: 2024-08-02T03:30:12.520Z
NVD
Status : Awaiting Analysis
Published: 2024-05-19T20:15:08.043
Modified: 2024-07-03T02:02:47.847
Link: CVE-2024-36078
Redhat
No data.