跳转到帖子

An XSS vulnerability was observed due to the execution of malicious JavaScript code from an externally shared file via non-sanitized parameter

recommended_posts

发布于
  • Members

An XSS vulnerability was observed due to the execution of malicious JavaScript code from an externally shared file via non-sanitized parameter

Severity
5
CVSS
(AV:N/AC:L/Au:S/C:P/I:P/A:N)
Published
08/12/2024
Created
01/16/2025
Added
01/10/2025
Modified
01/20/2025

Description

An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0. The vulnerability occurs due to inadequate input validation of the res parameter, allowing an authenticated attacker to inject and execute arbitrary JavaScript code within the context of another user's browser session. By uploading a malicious JavaScript file, accessible externally, and crafting a URL containing its location in the res parameter, the attacker can exploit this vulnerability. Subsequently, when another user visits the crafted URL, the malicious JavaScript code is executed.

Solution(s)

  • zimbra-collaboration-upgrade-latest

References

  • https://attackerkb.com/topics/cve-2024-33536
  • CVE - 2024-33536
  • https://wiki.zimbra.com/wiki/Zimbra_Releases/10.0.8#Security_Fixes
  • https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P40#Security_Fixes
  • 查看数 695
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…