In Zammad 6.4.x before 6.4.2, SSRF can occur. Authenticated admin users can enable webhooks in Zammad, which are triggered as POST requests when certain conditions are met. If a webhook endpoint returned a redirect response, Zammad would follow it automatically with another GET request. This could be abused by an attacker to cause GET requests for example in the local network.
History

Mon, 07 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 05 Apr 2025 21:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-918
Metrics cvssV3_1

{'score': 4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N'}


Sat, 05 Apr 2025 21:00:00 +0000

Type Values Removed Values Added
Description In Zammad 6.4.x before 6.4.2, SSRF can occur. Authenticated admin users can enable webhooks in Zammad, which are triggered as POST requests when certain conditions are met. If a webhook endpoint returned a redirect response, Zammad would follow it automatically with another GET request. This could be abused by an attacker to cause GET requests for example in the local network.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-04-05T00:00:00.000Z

Updated: 2025-04-07T16:12:55.755Z

Reserved: 2025-04-05T00:00:00.000Z

Link: CVE-2025-32358

cve-icon Vulnrichment

Updated: 2025-04-07T16:12:51.848Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-04-05T21:15:40.487

Modified: 2025-04-07T14:17:50.220

Link: CVE-2025-32358

cve-icon Redhat

No data.