An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15, 9.0, and 10.0. An attacker can send a PDF document through mail that contains malicious JavaScript. While previewing this file in webmail in the Chrome browser, the stored XSS payload is executed. (This has been mitigated by sanitising the JavaScript code present in a PDF document.)
References
Link | Resource |
---|---|
https://wiki.zimbra.com/wiki/Security_Center | Release Notes Vendor Advisory |
https://wiki.zimbra.com/wiki/Zimbra_Responsible_Disclosure_Policy | Product |
https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories | Vendor Advisory |
https://wiki.zimbra.com/wiki/Security_Center | Release Notes Vendor Advisory |
https://wiki.zimbra.com/wiki/Zimbra_Responsible_Disclosure_Policy | Product |
https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://wiki.zimbra.com/wiki/Security_Center - Release Notes, Vendor Advisory | |
References | () https://wiki.zimbra.com/wiki/Zimbra_Responsible_Disclosure_Policy - Product | |
References | () https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories - Vendor Advisory |
07 Oct 2024, 18:31
Type | Values Removed | Values Added |
---|---|---|
References | () https://wiki.zimbra.com/wiki/Security_Center - Release Notes, Vendor Advisory | |
References | () https://wiki.zimbra.com/wiki/Zimbra_Responsible_Disclosure_Policy - Product | |
References | () https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
CWE | CWE-79 | |
CPE | cpe:2.3:a:zimbra:collaboration:8.8.15:p25:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p4:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p21:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p8:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p33:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p40:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p2:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p16:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p9:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p29:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p1:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p33:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p1:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p37:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p18:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p36:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p28:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p20:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p24.1:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p5:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p30:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p10:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p19:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p3:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p17:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p32:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p24:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p6:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p4:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p34:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p26:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p30:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p7.1:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p15:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p42:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p10:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p24:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p11:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p12:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p14:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p6:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p26:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p31:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p2:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p22:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p5:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p15:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p9:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p7:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p23:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p41:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p34:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p8:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p13:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p21:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p32:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p25:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p27:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p19:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:-:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p13:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p14:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p35:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:*:*:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p27:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p23:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p7:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p3:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p16:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p35:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p31:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p20:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p11:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:-:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p0:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p43:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p12:*:*:*:*:*:* |
|
First Time |
Zimbra
Zimbra collaboration |
13 Feb 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-13 16:15
Updated : 2024-11-21 08:26
NVD link : CVE-2023-45207
Mitre link : CVE-2023-45207
CVE.ORG link : CVE-2023-45207
JSON object : View
Products Affected
zimbra
- collaboration
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')