First published: Wed Nov 20 2024(Updated: )
An issue was discovered in Zimbra Collaboration (ZCS) through 10.0. Zimbra Webmail (Modern UI) is vulnerable to a stored Cross-Site Scripting (XSS) attack due to improper sanitization of user input. This allows an attacker to inject malicious code into specific fields of an e-mail message. When the victim adds the attacker to their contacts, the malicious code is stored and executed when viewing the contact list. This can lead to unauthorized actions such as arbitrary mail sending, mailbox exfiltration, profile picture alteration, and other malicious actions. Proper sanitization and escaping of input fields are necessary to mitigate this vulnerability.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zimbra Collaboration | <=10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45510 is considered a high-severity vulnerability due to its potential for exploitation via stored Cross-Site Scripting (XSS).
To fix CVE-2024-45510, upgrade Zimbra Collaboration to version 10.1.1 or later, which includes security fixes for this issue.
CVE-2024-45510 is categorized as a stored Cross-Site Scripting (XSS) vulnerability affecting Zimbra Webmail (Modern UI).
CVE-2024-45510 affects all users of Zimbra Collaboration up to version 10.0.
Attackers exploiting CVE-2024-45510 can inject malicious code into email messages, potentially compromising users' systems when they open affected emails.