An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15, 9.0, and 10.0. An attacker can send a PDF document through mail that contains malicious JavaScript. While previewing this file in webmail in the Chrome browser, the stored XSS payload is executed. (This has been mitigated by sanitising the JavaScript code present in a PDF document.)
References
Link | Resource |
---|---|
https://wiki.zimbra.com/wiki/Security_Center | Release Notes Vendor Advisory |
https://wiki.zimbra.com/wiki/Zimbra_Responsible_Disclosure_Policy | Product |
https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
07 Oct 2024, 18:31
Type | Values Removed | Values Added |
---|---|---|
References | () https://wiki.zimbra.com/wiki/Security_Center - Release Notes, Vendor Advisory | |
References | () https://wiki.zimbra.com/wiki/Zimbra_Responsible_Disclosure_Policy - Product | |
References | () https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories - Vendor Advisory | |
CPE | cpe:2.3:a:zimbra:collaboration:8.8.15:p21:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p8:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p14:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p40:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p6:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p4:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p11:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p28:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p12:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p23:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p26:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p35:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p11:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:*:*:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p17:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p41:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p7:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p4:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p32:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p31:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p36:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p10:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p21:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p33:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p37:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p3:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p34:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p27:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p27:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p24:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p30:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p12:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p20:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p29:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p32:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p26:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p9:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p20:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:-:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:-:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p42:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p14:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p24:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p19:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p16:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p25:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p34:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p25:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p7:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p33:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p13:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p35:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p15:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p0:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p23:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p7.1:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p22:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p31:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p30:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p15:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p1:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p19:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p2:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p18:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p5:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p6:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p43:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p8:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p2:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p24.1:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p13:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p10:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p9:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p5:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p3:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p16:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p1:*:*:*:*:*:* |
|
Summary |
|
|
First Time |
Zimbra
Zimbra collaboration |
|
CWE | CWE-79 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
13 Feb 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-13 16:15
Updated : 2024-10-07 18:31
NVD link : CVE-2023-45207
Mitre link : CVE-2023-45207
CVE.ORG link : CVE-2023-45207
JSON object : View
Products Affected
zimbra
- collaboration
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')