跳转到帖子

Addressed XSS vulnerability in zimbraAdmin interface due to non sanitised parameter

recommended_posts

发布于
  • Members

Addressed XSS vulnerability in zimbraAdmin interface due to non sanitised parameter

Severity
5
CVSS
(AV:N/AC:L/Au:S/C:P/I:P/A:N)
Published
08/12/2024
Created
01/16/2025
Added
01/10/2025
Modified
01/20/2025

Description

An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0, issue 1 of 2. A reflected cross-site scripting (XSS) vulnerability has been identified in the Zimbra webmail admin interface. This vulnerability occurs due to inadequate input validation of the packages parameter, allowing an authenticated attacker to inject and execute arbitrary JavaScript code within the context of another user's browser session. By uploading a malicious JavaScript file and crafting a URL containing its location in the packages parameter, the attacker can exploit this vulnerability. Subsequently, when another user visits the crafted URL, the malicious JavaScript code is executed.

Solution(s)

  • zimbra-collaboration-upgrade-latest

References

  • https://attackerkb.com/topics/cve-2024-33533
  • CVE - 2024-33533
  • https://wiki.zimbra.com/wiki/Zimbra_Releases/10.0.8#Security_Fixes
  • https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P40#Security_Fixes
  • 查看数 697
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…