An issue was discovered in the webmail component in Zimbra Collaboration Suite (ZCS) 8.8.15 and 9.0. When using preauth, CSRF tokens are not checked on some POST endpoints. Thus, when an authenticated user views an attacker-controlled page, a request will be sent to the application that appears to be intended. The CSRF token is omitted from the request, but the request still succeeds.
References
Link | Resource |
---|---|
https://wiki.zimbra.com/wiki/Security_Center | Patch Vendor Advisory |
https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
16 Aug 2022, 15:17
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-352 | |
CPE | cpe:2.3:a:zimbra:collaboration:9.0.0:-:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:-:*:*:*:*:*:* |
|
References | (MISC) https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories - Vendor Advisory | |
References | (MISC) https://wiki.zimbra.com/wiki/Security_Center - Patch, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.7 |
12 Aug 2022, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-08-12 15:15
Updated : 2024-02-04 22:51
NVD link : CVE-2022-37043
Mitre link : CVE-2022-37043
CVE.ORG link : CVE-2022-37043
JSON object : View
Products Affected
zimbra
- collaboration
CWE
CWE-352
Cross-Site Request Forgery (CSRF)