跳转到帖子

Multiple possible cross-site scripting (XSS) vulnerabilities were observed in the robohelp package. The package has now been made optional. This means that users will now be access help documentation at the URL - https://www.zimbra.com/documentation/.

recommended_posts

发布于
  • 超级管理员

Multiple possible cross-site scripting (XSS) vulnerabilities were observed in the robohelp package. The package has now been made optional. This means that users will now be access help documentation at the URL - https://www.zimbra.com/documentation/.

Severity
6
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:N)
Published
02/13/2024
Created
01/16/2025
Added
01/10/2025
Modified
01/20/2025

Description

An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15, 9.0, and 10.0. Through the help document endpoint in webmail, an attacker can inject JavaScript or HTML code that leads to cross-site scripting (XSS). (Adding an adequate message to avoid malicious code will mitigate this issue.)

Solution(s)

  • zimbra-collaboration-upgrade-latest

References

  • https://attackerkb.com/topics/cve-2023-45206
  • CVE - 2023-45206
  • https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories
  • https://wiki.zimbra.com/wiki/Security_Center
  • https://wiki.zimbra.com/wiki/Zimbra_Responsible_Disclosure_Policy
  • 查看数 709
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…