CVE-2022-24682

An issue was discovered in the Calendar feature in Zimbra Collaboration Suite 8.8.x before 8.8.15 patch 30 (update 1), as exploited in the wild starting in December 2021. An attacker could place HTML containing executable JavaScript inside element attributes. This markup becomes unescaped, causing arbitrary markup to be injected into the document.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:zimbra:collaboration:*:*:*:*:*:*:*:*
cpe:2.3:a:zimbra:collaboration:8.8.15:-:*:*:*:*:*:*
cpe:2.3:a:zimbra:collaboration:8.8.15:p1:*:*:*:*:*:*
cpe:2.3:a:zimbra:collaboration:8.8.15:p10:*:*:*:*:*:*
cpe:2.3:a:zimbra:collaboration:8.8.15:p11:*:*:*:*:*:*
cpe:2.3:a:zimbra:collaboration:8.8.15:p12:*:*:*:*:*:*
cpe:2.3:a:zimbra:collaboration:8.8.15:p13:*:*:*:*:*:*
cpe:2.3:a:zimbra:collaboration:8.8.15:p14:*:*:*:*:*:*
cpe:2.3:a:zimbra:collaboration:8.8.15:p15:*:*:*:*:*:*
cpe:2.3:a:zimbra:collaboration:8.8.15:p16:*:*:*:*:*:*
cpe:2.3:a:zimbra:collaboration:8.8.15:p17:*:*:*:*:*:*
cpe:2.3:a:zimbra:collaboration:8.8.15:p18:*:*:*:*:*:*
cpe:2.3:a:zimbra:collaboration:8.8.15:p19:*:*:*:*:*:*
cpe:2.3:a:zimbra:collaboration:8.8.15:p2:*:*:*:*:*:*
cpe:2.3:a:zimbra:collaboration:8.8.15:p20:*:*:*:*:*:*
cpe:2.3:a:zimbra:collaboration:8.8.15:p21:*:*:*:*:*:*
cpe:2.3:a:zimbra:collaboration:8.8.15:p22:*:*:*:*:*:*
cpe:2.3:a:zimbra:collaboration:8.8.15:p23:*:*:*:*:*:*
cpe:2.3:a:zimbra:collaboration:8.8.15:p24:*:*:*:*:*:*
cpe:2.3:a:zimbra:collaboration:8.8.15:p25:*:*:*:*:*:*
cpe:2.3:a:zimbra:collaboration:8.8.15:p26:*:*:*:*:*:*
cpe:2.3:a:zimbra:collaboration:8.8.15:p27:*:*:*:*:*:*
cpe:2.3:a:zimbra:collaboration:8.8.15:p28:*:*:*:*:*:*
cpe:2.3:a:zimbra:collaboration:8.8.15:p29:*:*:*:*:*:*
cpe:2.3:a:zimbra:collaboration:8.8.15:p3:*:*:*:*:*:*
cpe:2.3:a:zimbra:collaboration:8.8.15:p4:*:*:*:*:*:*
cpe:2.3:a:zimbra:collaboration:8.8.15:p5:*:*:*:*:*:*
cpe:2.3:a:zimbra:collaboration:8.8.15:p6:*:*:*:*:*:*
cpe:2.3:a:zimbra:collaboration:8.8.15:p7:*:*:*:*:*:*
cpe:2.3:a:zimbra:collaboration:8.8.15:p8:*:*:*:*:*:*
cpe:2.3:a:zimbra:collaboration:8.8.15:p9:*:*:*:*:*:*

History

21 Nov 2024, 06:50

Type Values Removed Values Added
References () https://blog.zimbra.com/2022/02/hotfix-available-5-feb-for-zero-day-exploit-vulnerability-in-zimbra-8-8-15/ - Vendor Advisory () https://blog.zimbra.com/2022/02/hotfix-available-5-feb-for-zero-day-exploit-vulnerability-in-zimbra-8-8-15/ - Vendor Advisory
References () https://wiki.zimbra.com/wiki/Security_Center - Vendor Advisory () https://wiki.zimbra.com/wiki/Security_Center - Vendor Advisory
References () https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P30 - Release Notes, Vendor Advisory () https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P30 - Release Notes, Vendor Advisory
References () https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories - Vendor Advisory () https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories - Vendor Advisory
References () https://www.volexity.com/blog/2022/02/03/operation-emailthief-active-exploitation-of-zero-day-xss-vulnerability-in-zimbra/ - Exploit, Third Party Advisory () https://www.volexity.com/blog/2022/02/03/operation-emailthief-active-exploitation-of-zero-day-xss-vulnerability-in-zimbra/ - Exploit, Third Party Advisory

08 Aug 2023, 14:21

Type Values Removed Values Added
CWE CWE-79 CWE-116

Information

Published : 2022-02-09 04:15

Updated : 2024-11-21 06:50


NVD link : CVE-2022-24682

Mitre link : CVE-2022-24682

CVE.ORG link : CVE-2022-24682


JSON object : View

Products Affected

zimbra

  • collaboration
CWE
CWE-116

Improper Encoding or Escaping of Output