Source |
Cyble |
Identifiant |
8656463 |
Date de publication |
2025-03-18 13:50:51 (vue: 2025-03-18 14:08:20) |
Titre |
SQLI, XSS et SSRF: décomposer les dernières menaces de sécurité de Zimbra \\ SQLi, XSS, and SSRF: Breaking Down Zimbra\\'s Latest Security Threats |
Texte |
Overview
Zimbra Collaboration Suite (ZCS) is a widely used email and collaboration platform. Security remains a top priority for administrators and users who rely on Zimbra for business communication. Recently, Zimbra has addressed several critical security issues, including stored cross-site scripting (XSS), SQL injection (SQLi), and server-side request forgery (SSRF).
This article provides a detailed technical breakdown of these vulnerabilities, their potential impact, and recommended actions.
Below is an in-depth analysis of these vulnerabilities.
1. Stored Cross-Site Scripting (XSS) - CVE-2025-27915
Affected Versions: ZCS 9.0, 10.0, and 10.1 (before patches 44, 10.0.13, and 10.1.5)
Patch Availability: Fixed in the latest patches
Description:
This vulnerability resides in the Classic Web Client due to insufficient sanitization of HTML content in ICS calendar invite files.
Attackers can embed malicious JavaScript inside an ICS file, which executes when a victim opens an email containing the ICS entry.
Exploitation allows unauthorized actions within the victim\'s session, such as modifying email filters to redirect messages to an attacker\'s inbox.
|
Notes |
★★
|
Envoyé |
Oui |
Condensat |
1024x512 2025 25064 25065 27915 300x150 access accounts actions addressed administrator administrators advisories advisory affected against alerts: allow allows analysis analyze api application apply are article attack attacker attackers attacks attempts authenticated authentication availability: avoid awareness back backups before below best block blogs breakdown breaking business calendar can caption= case center channels classic client collaboration com/wp commands communication compromise conclusion containing content content/uploads/2025/03/cyble control could credential critical cross cve cyble data data: database deploy deployment depth description: detailed detect discovered down due educate email embed embedded emerging employees enable endpoint endpoints enforce engineering ensure entry enumeration escalation executes execution exfiltration exists exploitation exposing factor feed file file= files filter filters firewalls fixed flaw follow following force forgery forwarding from functions further general granting harden has hijacking html https://cyble ics image immediately impact impact: implement importance inbox including increased indicators information informed infrastructure inject injection input inside insufficient internal invite issues javascript jpg keep large lateral latest like limit logging logs loss maintain make malicious management manipulate measures mechanisms: medium messages metadata mfa mitigate mitigation modifying monitor movement multi must necessary network nvd opens organizations outbound overview parameterized parameters parser password patch patches performed permissions phishing platform policies possible potential potentially practices practices: prevent priority privilege privileges: proactive promptly protect provides queries query recently recommendations recommended records redirect references: regularly reinforce rely remains remediation: request requests resides resources restrict retrieve risk risks rss safeguard sanitization scripting secure securely security segmentation sensitive server servers service session several side signs site soap social software: sql sqli ssrf ssrf: staying stored strict strong such suite surface system tech technical theft these threats through title= top training: unauthorized unnecessary untrusted update updated upgrade urls use used user users validation versions: victim vulnerabilities vulnerability waf wafs web when where which who widely within xss zcs zimbra zimbrasyncservice |
Tags |
Vulnerability
Industrial
Technical
|
Stories |
|
Move |
|