Overview
- Description
- Zendesk before 2024-07-02 allows remote attackers to read ticket history via e-mail spoofing, because Cc fields are extracted from incoming e-mail messages and used to grant additional authorization for ticket viewing, the mechanism for detecting spoofed e-mail messages is insufficient, and the support e-mail addresses associated with individual tickets are predictable.
- Source
- cve@mitre.org
- NVD status
- Awaiting Analysis
Risk scores
CVSS 3.1
- Type
- Secondary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- Severity
- HIGH
Weaknesses
- 134c704f-9b21-4f2e-91b3-4a467353bcc0
- CWE-290
Social media
- Hype score
- Not currently trending
Zendesk のメール・スプーフィングの脆弱性 CVE-2024-49193 が FIX:長々と放置された理由は? https://t.co/poJbx2DQAP #CyberAttack #Exploit #Mail #Scammer #Spoofing #TTP #Vulnerability #Zendesk
@iototsecnews
22 Oct 2024
8 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-49193 (CVSS:7.5, HIGH) is Awaiting Analysis. Zendesk before 2024-07-02 allows remote attackers to read ticket history via e-mail spoofing, because Cc fields are extr..https://t.co/32i0ZHsjZz #cybersecurityawareness #cybersecurity #CVE #infosec #hacker #nvd #mitre
@cracbot
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes