CVE-2022-37043

An issue was discovered in the webmail component in Zimbra Collaboration Suite (ZCS) 8.8.15 and 9.0. When using preauth, CSRF tokens are not checked on some POST endpoints. Thus, when an authenticated user views an attacker-controlled page, a request will be sent to the application that appears to be intended. The CSRF token is omitted from the request, but the request still succeeds.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:zimbra:collaboration:8.8.15:-:*:*:*:*:*:*
cpe:2.3:a:zimbra:collaboration:9.0.0:-:*:*:*:*:*:*

History

16 Aug 2022, 15:17

Type Values Removed Values Added
CWE CWE-352
CPE cpe:2.3:a:zimbra:collaboration:9.0.0:-:*:*:*:*:*:*
cpe:2.3:a:zimbra:collaboration:8.8.15:-:*:*:*:*:*:*
References (MISC) https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories - (MISC) https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories - Vendor Advisory
References (MISC) https://wiki.zimbra.com/wiki/Security_Center - (MISC) https://wiki.zimbra.com/wiki/Security_Center - Patch, Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.7

12 Aug 2022, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-08-12 15:15

Updated : 2024-02-04 22:51


NVD link : CVE-2022-37043

Mitre link : CVE-2022-37043

CVE.ORG link : CVE-2022-37043


JSON object : View

Products Affected

zimbra

  • collaboration
CWE
CWE-352

Cross-Site Request Forgery (CSRF)