First published: Thu Nov 21 2024(Updated: )
In Zimbra Collaboration (ZCS) 9.0 and 10.0, a vulnerability in the Webmail Modern UI allows execution of stored Cross-Site Scripting (XSS) payloads. An attacker with administrative access to the Zimbra Administration Panel can inject malicious JavaScript code while configuring an email account. This injected code is stored on the server and executed in the context of the victim's browser when interacting with specific elements in the web interface. (The vulnerability can be mitigated by properly sanitizing input parameters to prevent the injection of malicious code.)
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zimbra Collaboration | >=9.0<=10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45194 is classified as a medium severity vulnerability due to its potential for Cross-Site Scripting (XSS) exploitation.
To fix CVE-2024-45194, update your Zimbra Collaboration Suite to the latest version (10.1.1 or later) where the vulnerability has been addressed.
CVE-2024-45194 affects users of Zimbra Collaboration Suite versions 9.0 and 10.0, particularly those with administrative access.
CVE-2024-45194 is related to stored Cross-Site Scripting (XSS), allowing attackers to execute malicious scripts via the Webmail Modern UI.
An attacker with administrative access can inject malicious JavaScript while configuring an email account, potentially compromising user data.