跳转到帖子

A Cross-Site Scripting (XSS) issue that allowed an attacker to inject and execute malicious code via email account configurations has been resolved.

recommended_posts

发布于
  • Members

A Cross-Site Scripting (XSS) issue that allowed an attacker to inject and execute malicious code via email account configurations has been resolved.

Severity
5
CVSS
(AV:N/AC:L/Au:M/C:P/I:P/A:N)
Published
11/21/2024
Created
01/16/2025
Added
01/10/2025
Modified
01/20/2025

Description

In Zimbra Collaboration (ZCS) 9.0 and 10.0, a vulnerability in the Webmail Modern UI allows execution of stored Cross-Site Scripting (XSS) payloads. An attacker with administrative access to the Zimbra Administration Panel can inject malicious JavaScript code while configuring an email account. This injected code is stored on the server and executed in the context of the victim's browser when interacting with specific elements in the web interface. (The vulnerability can be mitigated by properly sanitizing input parameters to prevent the injection of malicious code.)

Solution(s)

  • zimbra-collaboration-upgrade-latest

References

  • https://attackerkb.com/topics/cve-2024-45194
  • CVE - 2024-45194
  • https://wiki.zimbra.com/wiki/Zimbra_Responsible_Disclosure_Policy
  • https://wiki.zimbra.com/wiki/Zimbra_Releases/10.1.1#Security_Fixes
  • https://wiki.zimbra.com/wiki/Zimbra_Releases/10.0.9#Security_Fixes
  • https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P41#Security_Fixes
  • 查看数 702
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…