First published: Thu Mar 05 2020(Updated: )
An issue was discovered in Zammad 3.0 through 3.2. The Forgot Password functionality is implemented in a way that would enable an anonymous user to guess valid user emails. In the current implementation, the application responds differently depending on whether the input supplied was recognized as associated with a valid user. This behavior could be used as part of a two-stage automated attack. During the first stage, an attacker would iterate through a list of account names to determine which correspond to valid accounts. During the second stage, the attacker would use a list of common passwords to attempt to brute force credentials for accounts that were recognized by the system in the first stage.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zammad Zammad | >=1.0.0<=3.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10102 has a medium severity rating due to its potential for information disclosure.
To fix CVE-2020-10102, upgrade to Zammad version 3.3 or later that addresses this vulnerability.
CVE-2020-10102 affects Zammad versions 3.0 through 3.2, allowing email enumeration via the Forgot Password feature.
Yes, anonymous users can exploit CVE-2020-10102 by guessing valid user email addresses.
CVE-2020-10102 involves improper handling of user input in the Forgot Password functionality, leading to potential email discovery.