CVE-2024-45518
CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
0th
An issue was discovered in Zimbra Collaboration (ZCS) 10.1.x before 10.1.1, 10.0.x before 10.0.9, 9.0.0 before Patch 41, and 8.8.15 before Patch 46. It allows authenticated users to exploit Server-Side Request Forgery (SSRF) due to improper input sanitization and misconfigured domain whitelisting. This issue permits unauthorized HTTP requests to be sent to internal services, which can lead to Remote Code Execution (RCE) by chaining Command Injection within the internal service. When combined with existing XSS vulnerabilities, this SSRF issue can further facilitate Remote Code Execution (RCE).
| Vendor | n/a |
| Product | n/a |
| Published | Oct 22, 2024 |
| Last Updated | Oct 22, 2024 |
Stay Ahead of the Next One
Get instant alerts for n/a n/a
Be the first to know when new high vulnerabilities affecting n/a n/a are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
n/a / n/a
n/a
References
wiki.zimbra.com: https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories wiki.zimbra.com: https://wiki.zimbra.com/wiki/Security_Center wiki.zimbra.com: https://wiki.zimbra.com/wiki/Zimbra_Responsible_Disclosure_Policy wiki.zimbra.com: https://wiki.zimbra.com/wiki/Zimbra_Releases/10.1.1#Security_Fixes wiki.zimbra.com: https://wiki.zimbra.com/wiki/Zimbra_Releases/10.0.9#Security_Fixes wiki.zimbra.com: https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P41#Security_Fixes wiki.zimbra.com: https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P46#Security_Fixes