Zendesk before 2024-07-02 allows remote attackers to read ticket history via e-mail spoofing, because Cc fields are extracted from incoming e-mail messages and used to grant additional authorization for ticket viewing, the mechanism for detecting spoofed e-mail messages is insufficient, and the support e-mail addresses associated with individual tickets are predictable.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Oct 2024 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Zendesk
Zendesk zendesk
Weaknesses CWE-290
CPEs cpe:2.3:a:zendesk:zendesk:*:*:*:*:*:*:*:*
Vendors & Products Zendesk
Zendesk zendesk
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 12 Oct 2024 14:15:00 +0000

Type Values Removed Values Added
Description Zendesk before 2024-07-02 allows remote attackers to read ticket history via e-mail spoofing, because Cc fields are extracted from incoming e-mail messages and used to grant additional authorization for ticket viewing, the mechanism for detecting spoofed e-mail messages is insufficient, and the support e-mail addresses associated with individual tickets are predictable.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-10-16T20:06:28.668Z

Reserved: 2024-10-12T00:00:00

Link: CVE-2024-49193

cve-icon Vulnrichment

Updated: 2024-10-16T20:06:19.781Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-10-12T14:15:02.753

Modified: 2024-10-16T20:35:16.380

Link: CVE-2024-49193

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.