An open redirect vulnerability exists in the /preauth Servlet in Zimbra Collaboration Suite through 9.0. To exploit the vulnerability, an attacker would need to have obtained a valid zimbra auth token or a valid preauth token. Once the token is obtained, an attacker could redirect a user to any URL via isredirect=1&redirectURL= in conjunction with the token data (e.g., a valid authtoken= value).
References
Link | Resource |
---|---|
https://wiki.zimbra.com/wiki/Security_Center | Release Notes Vendor Advisory |
https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P23 | Release Notes Vendor Advisory |
https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P16 | Release Notes Vendor Advisory |
https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
08 Jul 2021, 18:57
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:zimbra:collaboration:8.8.15:p17:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p1:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p6:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p9:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:-:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p11:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p1:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p20:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p22:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p13:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p3:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p15:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p2:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p16:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p19:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p4:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p6:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p10:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p9:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p7:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p12:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:*:*:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p18:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p5:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p10:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p15:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p5:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p13:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p14:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p21:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p3:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p14:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p11:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p8:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:-:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p4:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p12:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p8:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p2:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p7:*:*:*:*:*:* |
|
References | (MISC) https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories - Vendor Advisory | |
References | (MISC) https://wiki.zimbra.com/wiki/Security_Center - Release Notes, Vendor Advisory | |
References | (MISC) https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P23 - Release Notes, Vendor Advisory | |
References | (MISC) https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P16 - Release Notes, Vendor Advisory | |
CWE | CWE-601 | |
CVSS |
v2 : v3 : |
v2 : 5.8
v3 : 6.1 |
02 Jul 2021, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-07-02 19:15
Updated : 2024-02-04 21:47
NVD link : CVE-2021-34807
Mitre link : CVE-2021-34807
CVE.ORG link : CVE-2021-34807
JSON object : View
Products Affected
zimbra
- collaboration
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')