First published: Sun Mar 31 2024(Updated: )
A vulnerability was found in Zimbra zm-admin-ajax up to 8.8.1. It has been classified as problematic. This affects the function XFormItem.prototype.setError of the file WebRoot/js/ajax/dwt/xforms/XFormItem.js of the component Form Textbox Field Error Handler. The manipulation of the argument message leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 8.8.2 is able to address this issue. The identifier of the patch is bb240ce0c71c01caabaa43eed30c78ba8d7d3591. It is recommended to upgrade the affected component. The identifier VDB-258621 was assigned to this vulnerability.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Zimbra | <=8.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-20191 has been classified as problematic.
To fix CVE-2017-20191, update Zimbra zm-admin-ajax to version 8.8.2 or later.
CVE-2017-20191 affects the XFormItem.prototype.setError function in the Form Textbox Field Error Handler.
Zimbra zm-admin-ajax versions up to and including 8.8.1 are impacted by CVE-2017-20191.
CVE-2017-20191 is a client-side vulnerability affecting the web interface of Zimbra.