First published: Tue Oct 22 2024(Updated: )
An issue was discovered in Zimbra Collaboration (ZCS) 10.1.x before 10.1.1, 10.0.x before 10.0.9, 9.0.0 before Patch 41, and 8.8.15 before Patch 46. It allows authenticated users to exploit Server-Side Request Forgery (SSRF) due to improper input sanitization and misconfigured domain whitelisting. This issue permits unauthorized HTTP requests to be sent to internal services, which can lead to Remote Code Execution (RCE) by chaining Command Injection within the internal service. When combined with existing XSS vulnerabilities, this SSRF issue can further facilitate Remote Code Execution (RCE).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zimbra Collaboration | >=10.0.0<10.0.9 | |
Zimbra Collaboration | =8.8.15 | |
Zimbra Collaboration | =8.8.15-p1 | |
Zimbra Collaboration | =8.8.15-p10 | |
Zimbra Collaboration | =8.8.15-p11 | |
Zimbra Collaboration | =8.8.15-p12 | |
Zimbra Collaboration | =8.8.15-p13 | |
Zimbra Collaboration | =8.8.15-p14 | |
Zimbra Collaboration | =8.8.15-p15 | |
Zimbra Collaboration | =8.8.15-p16 | |
Zimbra Collaboration | =8.8.15-p17 | |
Zimbra Collaboration | =8.8.15-p18 | |
Zimbra Collaboration | =8.8.15-p19 | |
Zimbra Collaboration | =8.8.15-p2 | |
Zimbra Collaboration | =8.8.15-p20 | |
Zimbra Collaboration | =8.8.15-p21 | |
Zimbra Collaboration | =8.8.15-p22 | |
Zimbra Collaboration | =8.8.15-p23 | |
Zimbra Collaboration | =8.8.15-p24 | |
Zimbra Collaboration | =8.8.15-p25 | |
Zimbra Collaboration | =8.8.15-p26 | |
Zimbra Collaboration | =8.8.15-p27 | |
Zimbra Collaboration | =8.8.15-p28 | |
Zimbra Collaboration | =8.8.15-p29 | |
Zimbra Collaboration | =8.8.15-p3 | |
Zimbra Collaboration | =8.8.15-p30 | |
Zimbra Collaboration | =8.8.15-p31 | |
Zimbra Collaboration | =8.8.15-p32 | |
Zimbra Collaboration | =8.8.15-p33 | |
Zimbra Collaboration | =8.8.15-p34 | |
Zimbra Collaboration | =8.8.15-p35 | |
Zimbra Collaboration | =8.8.15-p37 | |
Zimbra Collaboration | =8.8.15-p4 | |
Zimbra Collaboration | =8.8.15-p40 | |
Zimbra Collaboration | =8.8.15-p41 | |
Zimbra Collaboration | =8.8.15-p42 | |
Zimbra Collaboration | =8.8.15-p43 | |
Zimbra Collaboration | =8.8.15-p44 | |
Zimbra Collaboration | =8.8.15-p45 | |
Zimbra Collaboration | =8.8.15-p5 | |
Zimbra Collaboration | =8.8.15-p6 | |
Zimbra Collaboration | =8.8.15-p7 | |
Zimbra Collaboration | =8.8.15-p8 | |
Zimbra Collaboration | =8.8.15-p9 | |
Zimbra Collaboration | =9.0.0 | |
Zimbra Collaboration | =9.0.0-p0 | |
Zimbra Collaboration | =9.0.0-p1 | |
Zimbra Collaboration | =9.0.0-p10 | |
Zimbra Collaboration | =9.0.0-p11 | |
Zimbra Collaboration | =9.0.0-p12 | |
Zimbra Collaboration | =9.0.0-p13 | |
Zimbra Collaboration | =9.0.0-p14 | |
Zimbra Collaboration | =9.0.0-p15 | |
Zimbra Collaboration | =9.0.0-p16 | |
Zimbra Collaboration | =9.0.0-p19 | |
Zimbra Collaboration | =9.0.0-p2 | |
Zimbra Collaboration | =9.0.0-p20 | |
Zimbra Collaboration | =9.0.0-p21 | |
Zimbra Collaboration | =9.0.0-p23 | |
Zimbra Collaboration | =9.0.0-p24 | |
Zimbra Collaboration | =9.0.0-p24.1 | |
Zimbra Collaboration | =9.0.0-p25 | |
Zimbra Collaboration | =9.0.0-p26 | |
Zimbra Collaboration | =9.0.0-p27 | |
Zimbra Collaboration | =9.0.0-p3 | |
Zimbra Collaboration | =9.0.0-p33 | |
Zimbra Collaboration | =9.0.0-p34 | |
Zimbra Collaboration | =9.0.0-p35 | |
Zimbra Collaboration | =9.0.0-p36 | |
Zimbra Collaboration | =9.0.0-p37 | |
Zimbra Collaboration | =9.0.0-p38 | |
Zimbra Collaboration | =9.0.0-p39 | |
Zimbra Collaboration | =9.0.0-p4 | |
Zimbra Collaboration | =9.0.0-p40 | |
Zimbra Collaboration | =9.0.0-p5 | |
Zimbra Collaboration | =9.0.0-p6 | |
Zimbra Collaboration | =9.0.0-p7 | |
Zimbra Collaboration | =9.0.0-p7.1 | |
Zimbra Collaboration | =9.0.0-p8 | |
Zimbra Collaboration | =9.0.0-p9 | |
Zimbra Collaboration | =10.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45518 is classified as a moderate severity vulnerability due to the potential for authenticated users to exploit Server-Side Request Forgery.
To fix CVE-2024-45518, it is essential to upgrade Zimbra Collaboration to version 10.1.1 or newer, or apply the relevant patches for the affected versions.
CVE-2024-45518 affects Zimbra Collaboration versions 10.1.0, earlier than 10.1.1, any versions before 10.0.9, any 9.0.0 versions before Patch 41, and versions prior to 8.8.15 Patch 46.
In the context of CVE-2024-45518, Server-Side Request Forgery allows an authenticated attacker to send crafted requests that may lead to unauthorized access to sensitive internal resources.
No, CVE-2024-45518 requires authentication, meaning that only authenticated users can attempt to exploit this particular vulnerability.