48 results (0.001 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 2

Due to an issue with incorrect sudo permissions, Zimbra Collaboration Suite (ZCS) suffers from a local privilege escalation issue in versions 9.0.0 and prior, where the 'zimbra' user can effectively coerce postfix into running arbitrary commands as 'root'. Debido a un problema con permisos incorrectos de sudo, Zimbra Collaboration Suite (ZCS) sufre un problema de escalada de privilegios local en versiones 9.0.0 y anteriores, donde el usuario "zimbra" puede efectivamente coaccionar a postfix para que ejecute comandos arbitrarios como "root" • http://packetstormsecurity.com/files/169430/Zimbra-Privilege-Escalation.html https://github.com/rapid7/metasploit-framework/pull/17141 https://twitter.com/ldsopreload/status/1580539318879547392 • CWE-271: Privilege Dropping / Lowering Errors •

CVSS: 6.1EPSS: 0%CPEs: 12EXPL: 0

An XSS vulnerability exists in the Webmail component of Zimbra Collaboration Suite before 8.8.15 Patch 11. It allows an attacker to inject executable JavaScript into the account name of a user's profile. The injected code can be reflected and executed when changing an e-mail signature. Se presenta una vulnerabilidad de tipo XSS en el componente Webmail de Zimbra Collaboration Suite versiones anteriores a 8.8.15 Parche 11. Permite a un atacante inyectar JavaScript ejecutable en el nombre de la cuenta del perfil de un usuario. • https://wiki.zimbra.com/wiki/Security_Center https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P11 https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P4 https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.0EPSS: 0%CPEs: 14EXPL: 0

Zimbra before 8.8.15 Patch 10 and 9.x before 9.0.0 Patch 3 allows remote code execution via an avatar file. There is potential abuse of /service/upload servlet in the webmail subsystem. A user can upload executable files (exe,sh,bat,jar) in the Contact section of the mailbox as an avatar image for a contact. A user will receive a "Corrupt File" error, but the file is still uploaded and stored locally in /opt/zimbra/data/tmp/upload/, leaving it open to possible remote execution. Zimbra versiones anteriores a 8.8.15 Patch 10 y versiones 9.x anteriores a 9.0.0 Patch 3, permite una ejecución de código remota por medio de un archivo de avatar. • https://wiki.zimbra.com/wiki/Security_Center https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P3 https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 5.3EPSS: 0%CPEs: 8EXPL: 0

An issue was discovered in Zimbra Collaboration Suite (ZCS) before 8.8.15 Patch 7. When grantors revoked a shared calendar in Outlook, the calendar stayed mounted and accessible. Se detectó un problema en Zimbra Collaboration Suite (ZCS) versiones anteriores a 8.8.15 Patch 7. Cuando los otorgantes revocan un calendario compartido en Outlook, el calendario se mantuvo montado y accesible. • https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P7 • CWE-281: Improper Preservation of Permissions •

CVSS: 9.8EPSS: 62%CPEs: 8EXPL: 0

Zimbra Collaboration Suite (ZCS) before 8.8.15 Patch 7 allows SSRF when WebEx zimlet is installed and zimlet JSP is enabled. Zimbra Collaboration Suite (ZCS) versiones anteriores a 8.8.15 Patch 7, permite un ataque de tipo SSRF cuando WebEx zimlet es instalado y zimlet JSP está habilitado. • https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P7 • CWE-918: Server-Side Request Forgery (SSRF) •