An issue was discovered in Zammad before 3.5.1. A REST API call allows an attacker to change Ticket Article data in a way that defeats auditing.
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Link | Tags |
---|---|
https://zammad.com/en/advisories/zaa-2020-24 | vendor advisory |
https://github.com/zammad/zammad/commit/28944de180a88698509a656f61558bf9d7f810f4 | third party advisory patch |