FKIE_CVE-2022-35490
Vulnerability from fkie_nvd - Published: 2022-08-08 14:15 - Updated: 2024-11-21 07:11
Severity ?
Summary
Zammad 5.2.0 is vulnerable to privilege escalation. Zammad has a prevention against brute-force attacks trying to guess login credentials. After a configurable amount of attempts, users are invalidated and logins prevented. An attacker might work around this prevention, enabling them to send more than the configured amount of requests before the user invalidation takes place.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://zammad.com/de/advisories/zaa-2022-07 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://zammad.com/de/advisories/zaa-2022-07 | Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zammad:zammad:5.2.0:-:*:*:*:*:*:*",
"matchCriteriaId": "D5C8C170-EEEC-40FE-AFFD-81B895F2765B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:zammad:zammad:5.2.0:alpha:*:*:*:*:*:*",
"matchCriteriaId": "06BC0C3E-644D-42F6-B15D-B7DCB038F8A3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Zammad 5.2.0 is vulnerable to privilege escalation. Zammad has a prevention against brute-force attacks trying to guess login credentials. After a configurable amount of attempts, users are invalidated and logins prevented. An attacker might work around this prevention, enabling them to send more than the configured amount of requests before the user invalidation takes place."
},
{
"lang": "es",
"value": "Zammad 5.2.0 es vulnerable a la escalada de privilegios. Zammad presenta una prevenci\u00f3n contra los ataques de fuerza bruta que intentan adivinar las credenciales de acceso. Despu\u00e9s de una cantidad configurable de intentos, los usuarios son invalidados y se impide el inicio de sesi\u00f3n. Un atacante podr\u00eda burlar esta prevenci\u00f3n, permiti\u00e9ndole enviar m\u00e1s de la cantidad configurada de peticiones antes de que se produzca la no comprobaci\u00f3n del usuario"
}
],
"id": "CVE-2022-35490",
"lastModified": "2024-11-21T07:11:14.717",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-08-08T14:15:10.893",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://zammad.com/de/advisories/zaa-2022-07"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://zammad.com/de/advisories/zaa-2022-07"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-307"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…