- Description
- In Zammad before 6.3.1, a Ruby gem bundled by Zammad is installed with world-writable file permissions. This allowed a local attacker on the server to modify the gem's files, injecting arbitrary code into Zammad processes (which run with the environment and permissions of the Zammad user).
- Source
- cve@mitre.org
- NVD status
- Analyzed
CVSS 3.1
- Type
- Secondary
- Base score
- 6.7
- Impact score
- 5.9
- Exploitability score
- 0.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
- Severity
- MEDIUM
- 134c704f-9b21-4f2e-91b3-4a467353bcc0
- CWE-94
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zammad:zammad:6.3.0:-:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "E70D43EE-B9A8-43BC-BDBC-23A5DE3EC31E"
},
{
"criteria": "cpe:2.3:a:zammad:zammad:6.3.0:alpha:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "EB556B18-88A9-48C9-BA1B-D49B75E4A844"
}
],
"operator": "OR"
}
]
}
]