跳转到帖子

A Server-Side Request Forgery (SSRF) vulnerability that allowed unauthorized access to internal services has been addressed.

recommended_posts

发布于
  • Members

A Server-Side Request Forgery (SSRF) vulnerability that allowed unauthorized access to internal services has been addressed.

Severity
7
CVSS
(AV:N/AC:H/Au:S/C:C/I:C/A:C)
Published
10/22/2024
Created
01/16/2025
Added
01/10/2025
Modified
01/21/2025

Description

An issue was discovered in Zimbra Collaboration (ZCS) 10.1.x before 10.1.1, 10.0.x before 10.0.9, 9.0.0 before Patch 41, and 8.8.15 before Patch 46. It allows authenticated users to exploit Server-Side Request Forgery (SSRF) due to improper input sanitization and misconfigured domain whitelisting. This issue permits unauthorized HTTP requests to be sent to internal services, which can lead to Remote Code Execution (RCE) by chaining Command Injection within the internal service. When combined with existing XSS vulnerabilities, this SSRF issue can further facilitate Remote Code Execution (RCE).

Solution(s)

  • zimbra-collaboration-upgrade-latest

References

  • https://attackerkb.com/topics/cve-2024-45518
  • CVE - 2024-45518
  • https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories
  • https://wiki.zimbra.com/wiki/Security_Center
  • https://wiki.zimbra.com/wiki/Zimbra_Responsible_Disclosure_Policy
  • https://wiki.zimbra.com/wiki/Zimbra_Releases/10.1.1#Security_Fixes
  • https://wiki.zimbra.com/wiki/Zimbra_Releases/10.0.9#Security_Fixes
  • https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P41#Security_Fixes
  • https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P46#Security_Fixes
View more
  • 查看数 695
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…