49 results (0.002 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 2

Due to an issue with incorrect sudo permissions, Zimbra Collaboration Suite (ZCS) suffers from a local privilege escalation issue in versions 9.0.0 and prior, where the 'zimbra' user can effectively coerce postfix into running arbitrary commands as 'root'. Debido a un problema con permisos incorrectos de sudo, Zimbra Collaboration Suite (ZCS) sufre un problema de escalada de privilegios local en versiones 9.0.0 y anteriores, donde el usuario "zimbra" puede efectivamente coaccionar a postfix para que ejecute comandos arbitrarios como "root" • http://packetstormsecurity.com/files/169430/Zimbra-Privilege-Escalation.html https://github.com/rapid7/metasploit-framework/pull/17141 https://twitter.com/ldsopreload/status/1580539318879547392 • CWE-271: Privilege Dropping / Lowering Errors •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

An issue in /domain/service/.ewell-known/caldav of Zimbra Collaboration 8.8.12 allows attackers to redirect users to any arbitrary website of their choosing. Un problema en /domain/service/.ewell-known/caldav de Zimbra Collaboration versión 8.8.12, permite a atacantes redirigir a usuarios a cualquier sitio web arbitrario de su elección • https://github.com/buxu/bug/issues/3 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

A reflected cross-site scripting (XSS) vulnerability in the zimbraAdmin/public/secureRequest.jsp component of Zimbra Collaboration 8.8.12 allows unauthenticated attackers to execute arbitrary web scripts or HTML via a host header injection. Una vulnerabilidad de tipo cross-site scripting (XSS) reflejada en el componente zimbraAdmin/public/secureRequest.jsp de Zimbra Collaboration versión 8.8.12, permite a atacantes no autenticados ejecutar scripts web o HTML arbitrarios por medio de una inyección del encabezado de host • https://github.com/buxu/bug/issues/2 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 12EXPL: 0

An XSS vulnerability exists in the Webmail component of Zimbra Collaboration Suite before 8.8.15 Patch 11. It allows an attacker to inject executable JavaScript into the account name of a user's profile. The injected code can be reflected and executed when changing an e-mail signature. Se presenta una vulnerabilidad de tipo XSS en el componente Webmail de Zimbra Collaboration Suite versiones anteriores a 8.8.15 Parche 11. Permite a un atacante inyectar JavaScript ejecutable en el nombre de la cuenta del perfil de un usuario. • https://wiki.zimbra.com/wiki/Security_Center https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P11 https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P4 https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.0EPSS: 0%CPEs: 14EXPL: 0

Zimbra before 8.8.15 Patch 10 and 9.x before 9.0.0 Patch 3 allows remote code execution via an avatar file. There is potential abuse of /service/upload servlet in the webmail subsystem. A user can upload executable files (exe,sh,bat,jar) in the Contact section of the mailbox as an avatar image for a contact. A user will receive a "Corrupt File" error, but the file is still uploaded and stored locally in /opt/zimbra/data/tmp/upload/, leaving it open to possible remote execution. Zimbra versiones anteriores a 8.8.15 Patch 10 y versiones 9.x anteriores a 9.0.0 Patch 3, permite una ejecución de código remota por medio de un archivo de avatar. • https://wiki.zimbra.com/wiki/Security_Center https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P3 https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories • CWE-434: Unrestricted Upload of File with Dangerous Type •