An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15, 9.0, and 10.0. An attacker can send a PDF document through mail that contains malicious JavaScript. While previewing this file in webmail in the Chrome browser, the stored XSS payload is executed. (This has been mitigated by sanitising the JavaScript code present in a PDF document.)
Metrics
Affected Vendors & Products
References
History
Mon, 07 Oct 2024 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Zimbra
Zimbra collaboration |
|
Weaknesses | CWE-79 | |
CPEs | cpe:2.3:a:zimbra:collaboration:*:*:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:-:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p10:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p11:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p12:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p13:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p14:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p15:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p16:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p17:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p18:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p19:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p1:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p20:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p21:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p22:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p23:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p24:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p25:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p26:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p27:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p28:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p29:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p2:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p30:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p31:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p32:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p33:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p34:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p35:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p37:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p3:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p40:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p41:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p42:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p43:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p4:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p5:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p6:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p7:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p8:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:8.8.15:p9:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:-:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p0:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p10:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p11:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p12:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p13:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p14:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p15:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p16:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p19:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p1:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p20:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p21:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p23:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p24.1:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p24:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p25:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p26:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p27:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p2:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p30:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p31:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p32:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p33:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p34:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p35:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p36:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p3:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p4:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p5:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p6:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p7.1:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p7:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p8:*:*:*:*:*:* cpe:2.3:a:zimbra:collaboration:9.0.0:p9:*:*:*:*:*:* |
|
Vendors & Products |
Zimbra
Zimbra collaboration |
|
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-02-13T00:00:00
Updated: 2024-08-02T20:14:19.888Z
Reserved: 2023-10-05T00:00:00
Link: CVE-2023-45207
Vulnrichment
Updated: 2024-08-02T20:14:19.888Z
NVD
Status : Modified
Published: 2024-02-13T16:15:08.313
Modified: 2024-11-21T08:26:33.227
Link: CVE-2023-45207
Redhat
No data.