First published: Thu Nov 21 2024(Updated: )
An issue was discovered in Zimbra Collaboration (ZCS) through 10.1. A Cross-Site Scripting (XSS) vulnerability in the /h/rest endpoint of the Zimbra webmail and admin panel interfaces allows attackers to execute arbitrary JavaScript in the victim's session. This issue is caused by improper sanitization of user input, leading to potential compromise of sensitive information. Exploitation requires user interaction to access the malicious URL.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zimbra Collaboration Suite | <=10.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45517 has been classified as a high-severity vulnerability due to its potential to execute arbitrary JavaScript in victim sessions.
To mitigate CVE-2024-45517, update Zimbra Collaboration to the latest version beyond 10.1 where the issue is resolved.
CVE-2024-45517 allows attackers to perform Cross-Site Scripting (XSS) attacks, compromising user sessions and potentially leading to data theft.
Check if you are using Zimbra Collaboration version 10.1 or earlier, which is affected by CVE-2024-45517.
Yes, CVE-2024-45517 specifically affects the /h/rest endpoint of the Zimbra webmail and admin panel interfaces.