
Cloud Vulnerability DB
A community-led vulnerabilities database
A critical vulnerability was discovered in Zammad v5.3.0 (CVE-2022-48021) that allows attackers to execute arbitrary code or escalate privileges through bi-directional communication channels. The vulnerability was disclosed on December 21, 2022, and affects the front-end communication with the server via websocket or AJAX connections (Zammad Advisory, NVD).
The vulnerability exists in the bi-directional communication mechanism between Zammad's front-end and server. An attacker could craft and send special messages to the server, which would then be broadcast to all active front-end instances. When these malicious messages are received by the front-end clients, they could trigger unintended reactions leading to code execution or privilege escalation, depending on the user's permission level (Zammad Advisory).
The vulnerability allows attackers to perform malicious changes in their front-end (Remote Code Execution) and, depending on their permission set, execute privileged operations on the server through privilege escalation. This could potentially compromise the entire system's security (Zammad Advisory).
The vulnerability has been fixed in Zammad version 5.3.1. Users are strongly recommended to upgrade to this version or later. Updates can be obtained through the official Zammad website, FTP server, or through the OS package manager (Zammad Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."