CVE-2023-50455

7.5 HIGH

📋 TL;DR

This vulnerability in Zammad allows attackers to send excessive email verification requests to known addresses, causing denial of service through email spam and resource exhaustion. Organizations running Zammad versions before 6.2.0 are affected. The attack requires knowledge of target email addresses but no authentication.

💻 Affected Systems

Products:
  • Zammad
Versions: All versions before 6.2.0
Operating Systems: All platforms running Zammad
Default Config Vulnerable: ⚠️ Yes
Notes: All Zammad installations with email verification enabled are vulnerable. The feature is typically enabled by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete email system disruption, overwhelming mail servers with spam traffic, potential blacklisting of mail servers, and degraded Zammad performance affecting all users.

🟠

Likely Case

Targeted email spam to specific users, temporary email service disruption, and increased mail server load requiring administrative intervention.

🟢

If Mitigated

Minimal impact with proper rate limiting and monitoring in place, potentially some spam emails but no service disruption.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only knowledge of target email addresses and ability to send HTTP requests to the Zammad instance.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.2.0

Vendor Advisory: https://zammad.com/en/advisories/zaa-2023-06

Restart Required: Yes

Instructions:

1. Backup your Zammad instance. 2. Update to Zammad 6.2.0 or later using your package manager or deployment method. 3. Restart Zammad services. 4. Verify the update was successful.

🔧 Temporary Workarounds

Implement Web Application Firewall Rate Limiting

linux

Configure rate limiting for email verification endpoints using a WAF or reverse proxy

# Example nginx rate limiting
limit_req_zone $binary_remote_addr zone=emailverify:10m rate=10r/m;
# Add to location block for email verification endpoint
limit_req zone=emailverify burst=20 nodelay;

Disable Email Verification Feature

all

Temporarily disable email address verification if not required

# Edit Zammad configuration
# Set 'user_email_verification' to false in configuration file

🧯 If You Can't Patch

  • Implement network-level rate limiting for email verification endpoints using firewall or load balancer rules.
  • Monitor email verification logs for abnormal request patterns and implement alerting.

🔍 How to Verify

Check if Vulnerable:

Check Zammad version: if version is below 6.2.0, the system is vulnerable. Test by sending multiple email verification requests to the same address and monitoring if rate limiting occurs.

Check Version:

zammad version

Verify Fix Applied:

After updating to 6.2.0+, attempt to send multiple email verification requests to the same address within a short timeframe. Requests should be rate limited after a few attempts.

📡 Detection & Monitoring

Log Indicators:

  • Multiple POST requests to /api/v1/users/email_verify from same IP
  • Unusual spike in email verification attempts
  • Multiple emails sent to same address in short timeframe

Network Indicators:

  • High volume of HTTP POST requests to email verification endpoint
  • Unusual patterns of requests from single IP addresses

SIEM Query:

source="zammad.log" AND "POST /api/v1/users/email_verify" | stats count by src_ip, user_email | where count > 10

🔗 References

📤 Share & Export