Show plain JSON{"id": "CVE-2022-40816", "cveTags": [], "metrics": {"cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 6.5, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 3.6, "exploitabilityScore": 2.8}, {"type": "Secondary", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 6.5, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 3.6, "exploitabilityScore": 2.8}]}, "published": "2022-09-27T23:15:16.483", "references": [{"url": "https://zammad.com/de/advisories/zaa-2022-09", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://zammad.com/de/advisories/zaa-2022-09", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-863"}]}, {"type": "Secondary", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "description": [{"lang": "en", "value": "CWE-863"}]}], "descriptions": [{"lang": "en", "value": "Zammad 5.2.1 is vulnerable to Incorrect Access Control. Zammad's asset handling mechanism has logic to ensure that customer users are not able to see personal information of other users. This logic was not effective when used through a web socket connection, so that a logged-in attacker would be able to fetch personal data of other users by querying the Zammad API. This issue is fixed in , 5.2.2."}, {"lang": "es", "value": "Zammad versi\u00f3n 5.2.1, es vulnerable a un Control de Acceso Incorrecto. El mecanismo de manejo de activos de Zammad presenta una l\u00f3gica para asegurar que los usuarios clientes no puedan visualizar la informaci\u00f3n personal de otros usuarios. Esta l\u00f3gica no era efectiva cuando era usada mediante una conexi\u00f3n de socket web, por lo que un atacante que hubiera iniciado sesi\u00f3n podr\u00edaconseguir datos personales de otros usuarios consultando la API de Zammad. Este problema ha sido corregido en versi\u00f3n 5.2.2"}], "lastModified": "2025-05-21T15:16:00.797", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:zammad:zammad:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1EA4E4AF-5290-4B4B-B235-352DDE1B83A7", "versionEndExcluding": "5.2.2", "versionStartIncluding": "5.2.0"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}