Zimbra

Collaboration

57 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.68%
  • Veröffentlicht 06.01.2023 23:15:09
  • Zuletzt bearbeitet 09.04.2025 21:15:42

An issue was discovered in Zimbra Collaboration (ZCS) 9.0. XSS can occur on the Classic UI login page by injecting arbitrary JavaScript code in the username field. This occurs before the user logs into the system, which means that even if the attacke...

  • EPSS 2.45%
  • Veröffentlicht 05.12.2022 22:15:11
  • Zuletzt bearbeitet 24.04.2025 14:15:44

An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15 and 9.0. Remote code execution can occur through ClientUploader by an authenticated admin user. An authenticated admin user can upload files through the ClientUploader utility, and traverse...

  • EPSS 0.86%
  • Veröffentlicht 12.10.2022 20:15:11
  • Zuletzt bearbeitet 15.05.2025 15:16:04

In Zimbra Collaboration Suite (ZCS) 8.8.15, at the URL /h/calendar, one can trigger XSS by adding JavaScript code to the view parameter and changing the value of the uncheck parameter to a string (instead of default value of 10).

  • EPSS 0.89%
  • Veröffentlicht 12.10.2022 20:15:11
  • Zuletzt bearbeitet 15.05.2025 15:16:03

An issue was discovered in Zimbra Collaboration (ZCS) 9.0. XSS can occur via the onerror attribute of an IMG element, leading to information disclosure.

  • EPSS 0.73%
  • Veröffentlicht 12.10.2022 20:15:11
  • Zuletzt bearbeitet 15.05.2025 15:16:03

In Zimbra Collaboration Suite (ZCS) 8.8.15, the URL at /h/compose accepts an attachUrl parameter that is vulnerable to Reflected XSS. This allows executing arbitrary JavaScript on the victim's machine.

  • EPSS 0.86%
  • Veröffentlicht 12.10.2022 20:15:11
  • Zuletzt bearbeitet 15.05.2025 15:16:04

In Zimbra Collaboration Suite (ZCS) 8.8.15, /h/search?action=voicemail&action=listen accepts a phone parameter that is vulnerable to Reflected XSS. This allows executing arbitrary JavaScript on the victim's machine.

Exploit
  • EPSS 0.16%
  • Veröffentlicht 26.09.2022 02:15:10
  • Zuletzt bearbeitet 21.05.2025 19:16:04

An issue was discovered in Zimbra Collaboration (ZCS) 8.8.x and 9.x (e.g., 8.8.15). The Sudo configuration permits the zimbra user to execute the NGINX binary as root with arbitrary parameters. As part of its intended functionality, NGINX can load a ...

Exploit
  • EPSS 5.13%
  • Veröffentlicht 16.08.2022 20:15:07
  • Zuletzt bearbeitet 21.11.2024 07:14:54

Zimbra's sudo configuration permits the zimbra user to execute the zmslapd binary as root with arbitrary parameters. As part of its intended functionality, zmslapd can load a user-defined configuration file, which includes plugins in the form of .so ...

  • EPSS 0.97%
  • Veröffentlicht 12.08.2022 15:15:16
  • Zuletzt bearbeitet 21.11.2024 07:14:20

In Zimbra Collaboration Suite (ZCS) 8.8.15, the URL at /h/search?action accepts parameters called extra, title, and onload that are partially sanitised and lead to reflected XSS that allows executing arbitrary JavaScript on the victim's machine.

  • EPSS 0.34%
  • Veröffentlicht 12.08.2022 15:15:16
  • Zuletzt bearbeitet 21.11.2024 07:14:20

An issue was discovered in the webmail component in Zimbra Collaboration Suite (ZCS) 8.8.15 and 9.0. When using preauth, CSRF tokens are not checked on some POST endpoints. Thus, when an authenticated user views an attacker-controlled page, a request...