NIXPKGS-2026-1024
GitHub issue
published on
by @LeSuisse Activity log
- Created automatic suggestion
- @LeSuisse removed package python312Packages.zammad-py
- @LeSuisse removed package python313Packages.zammad-py
- @LeSuisse removed package python314Packages.zammad-py
- @LeSuisse accepted
- @LeSuisse published on GitHub
Zammad has a Server-side request forgery (SSRF) via webhooks
Zammad is a web based open source helpdesk/customer support system. Prior to 7.0.1 and 6.5.4, the webhook model was missing a proper validation for loop back addresses, or link-local addresses — only the URL scheme (HTTP/HTTPS) as well as the hostname was checked. This could end up in retrieving confidential metadata of cloud/hosting providers. The existing check is now extended and is applied when configuring webhooks as well as triggering webhook jobs. This vulnerability is fixed in 7.0.1 and 6.5.4.
References
-
https://github.com/zammad/zammad/security/advisories/GHSA-2vgc-vfh2-rw75 x_refsource_CONFIRM
Affected products
zammad
- ==< 6.5.4
- ==>= 7.0.0-alpha, < 7.0.1
Matching in nixpkgs
Ignored packages (3)
pkgs.python312Packages.zammad-py
Python API client for accessing zammad REST API
pkgs.python313Packages.zammad-py
Python API client for accessing zammad REST API
pkgs.python314Packages.zammad-py
Python API client for accessing zammad REST API
Package maintainers
-
@NetaliDev Jennifer Graul <me@netali.de>
-
@Radvendii Taeer Bar-Yam <taeer@necsi.edu>