Vulnerability Description
An issue was discovered in Zammad before 1.0.4, 1.1.x before 1.1.3, and 1.2.x before 1.2.1, caused by lack of a protection mechanism involving HTTP Access-Control headers. To exploit the vulnerability, an attacker can send cross-domain requests directly to the REST API for users with a valid session cookie and receive the result.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zammad | Zammad | <= 1.0.3 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/96937Third Party AdvisoryVDB Entry
- https://zammad.com/de/news/security-advisory-zaa-2017-01Vendor Advisory
- http://www.securityfocus.com/bid/96937Third Party AdvisoryVDB Entry
- https://zammad.com/de/news/security-advisory-zaa-2017-01Vendor Advisory
FAQ
What is CVE-2017-6080?
CVE-2017-6080 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An issue was discovered in Zammad before 1.0.4, 1.1.x before 1.1.3, and 1.2.x before 1.2.1, caused by lack of a protection mechanism involving HTTP Access-Control headers. To exploit the vulnerability...
How severe is CVE-2017-6080?
CVE-2017-6080 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-6080?
Check the references section above for vendor advisories and patch information. Affected products include: Zammad Zammad.