In Zimbra Collaboration Suite (ZCS) 8.8.15, /h/search?action=voicemail&action=listen accepts a phone parameter that is vulnerable to Reflected XSS. This allows executing arbitrary JavaScript on the victim's machine.
References
Link | Resource |
---|---|
https://wiki.zimbra.com/wiki/Security_Center | Vendor Advisory |
https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories | Vendor Advisory |
https://wiki.zimbra.com/wiki/Security_Center | Vendor Advisory |
https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories | Vendor Advisory |
Configurations
History
21 Nov 2024, 07:23
Type | Values Removed | Values Added |
---|---|---|
References | () https://wiki.zimbra.com/wiki/Security_Center - Vendor Advisory | |
References | () https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories - Vendor Advisory |
Information
Published : 2022-10-12 20:15
Updated : 2024-11-21 07:23
NVD link : CVE-2022-41350
Mitre link : CVE-2022-41350
CVE.ORG link : CVE-2022-41350
JSON object : View
Products Affected
zimbra
- collaboration
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')