8.8
CWE
918 79 77
Advisory Published
Updated

CVE-2024-45518: SSRF

First published: Tue Oct 22 2024(Updated: )

An issue was discovered in Zimbra Collaboration (ZCS) 10.1.x before 10.1.1, 10.0.x before 10.0.9, 9.0.0 before Patch 41, and 8.8.15 before Patch 46. It allows authenticated users to exploit Server-Side Request Forgery (SSRF) due to improper input sanitization and misconfigured domain whitelisting. This issue permits unauthorized HTTP requests to be sent to internal services, which can lead to Remote Code Execution (RCE) by chaining Command Injection within the internal service. When combined with existing XSS vulnerabilities, this SSRF issue can further facilitate Remote Code Execution (RCE).

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Zimbra Collaboration>=10.0.0<10.0.9
Zimbra Collaboration=8.8.15
Zimbra Collaboration=8.8.15-p1
Zimbra Collaboration=8.8.15-p10
Zimbra Collaboration=8.8.15-p11
Zimbra Collaboration=8.8.15-p12
Zimbra Collaboration=8.8.15-p13
Zimbra Collaboration=8.8.15-p14
Zimbra Collaboration=8.8.15-p15
Zimbra Collaboration=8.8.15-p16
Zimbra Collaboration=8.8.15-p17
Zimbra Collaboration=8.8.15-p18
Zimbra Collaboration=8.8.15-p19
Zimbra Collaboration=8.8.15-p2
Zimbra Collaboration=8.8.15-p20
Zimbra Collaboration=8.8.15-p21
Zimbra Collaboration=8.8.15-p22
Zimbra Collaboration=8.8.15-p23
Zimbra Collaboration=8.8.15-p24
Zimbra Collaboration=8.8.15-p25
Zimbra Collaboration=8.8.15-p26
Zimbra Collaboration=8.8.15-p27
Zimbra Collaboration=8.8.15-p28
Zimbra Collaboration=8.8.15-p29
Zimbra Collaboration=8.8.15-p3
Zimbra Collaboration=8.8.15-p30
Zimbra Collaboration=8.8.15-p31
Zimbra Collaboration=8.8.15-p32
Zimbra Collaboration=8.8.15-p33
Zimbra Collaboration=8.8.15-p34
Zimbra Collaboration=8.8.15-p35
Zimbra Collaboration=8.8.15-p37
Zimbra Collaboration=8.8.15-p4
Zimbra Collaboration=8.8.15-p40
Zimbra Collaboration=8.8.15-p41
Zimbra Collaboration=8.8.15-p42
Zimbra Collaboration=8.8.15-p43
Zimbra Collaboration=8.8.15-p44
Zimbra Collaboration=8.8.15-p45
Zimbra Collaboration=8.8.15-p5
Zimbra Collaboration=8.8.15-p6
Zimbra Collaboration=8.8.15-p7
Zimbra Collaboration=8.8.15-p8
Zimbra Collaboration=8.8.15-p9
Zimbra Collaboration=9.0.0
Zimbra Collaboration=9.0.0-p0
Zimbra Collaboration=9.0.0-p1
Zimbra Collaboration=9.0.0-p10
Zimbra Collaboration=9.0.0-p11
Zimbra Collaboration=9.0.0-p12
Zimbra Collaboration=9.0.0-p13
Zimbra Collaboration=9.0.0-p14
Zimbra Collaboration=9.0.0-p15
Zimbra Collaboration=9.0.0-p16
Zimbra Collaboration=9.0.0-p19
Zimbra Collaboration=9.0.0-p2
Zimbra Collaboration=9.0.0-p20
Zimbra Collaboration=9.0.0-p21
Zimbra Collaboration=9.0.0-p23
Zimbra Collaboration=9.0.0-p24
Zimbra Collaboration=9.0.0-p24.1
Zimbra Collaboration=9.0.0-p25
Zimbra Collaboration=9.0.0-p26
Zimbra Collaboration=9.0.0-p27
Zimbra Collaboration=9.0.0-p3
Zimbra Collaboration=9.0.0-p33
Zimbra Collaboration=9.0.0-p34
Zimbra Collaboration=9.0.0-p35
Zimbra Collaboration=9.0.0-p36
Zimbra Collaboration=9.0.0-p37
Zimbra Collaboration=9.0.0-p38
Zimbra Collaboration=9.0.0-p39
Zimbra Collaboration=9.0.0-p4
Zimbra Collaboration=9.0.0-p40
Zimbra Collaboration=9.0.0-p5
Zimbra Collaboration=9.0.0-p6
Zimbra Collaboration=9.0.0-p7
Zimbra Collaboration=9.0.0-p7.1
Zimbra Collaboration=9.0.0-p8
Zimbra Collaboration=9.0.0-p9
Zimbra Collaboration=10.1.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-45518?

    CVE-2024-45518 is classified as a moderate severity vulnerability due to the potential for authenticated users to exploit Server-Side Request Forgery.

  • How do I fix CVE-2024-45518?

    To fix CVE-2024-45518, it is essential to upgrade Zimbra Collaboration to version 10.1.1 or newer, or apply the relevant patches for the affected versions.

  • What versions of Zimbra Collaboration are affected by CVE-2024-45518?

    CVE-2024-45518 affects Zimbra Collaboration versions 10.1.0, earlier than 10.1.1, any versions before 10.0.9, any 9.0.0 versions before Patch 41, and versions prior to 8.8.15 Patch 46.

  • What is Server-Side Request Forgery in the context of CVE-2024-45518?

    In the context of CVE-2024-45518, Server-Side Request Forgery allows an authenticated attacker to send crafted requests that may lead to unauthorized access to sensitive internal resources.

  • Can an unauthenticated user exploit CVE-2024-45518?

    No, CVE-2024-45518 requires authentication, meaning that only authenticated users can attempt to exploit this particular vulnerability.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203