An issue was discovered in ZmMailMsgView.js in the Calendar Invite component in Zimbra Collaboration Suite 8.8.x before 8.8.15 Patch 23. An attacker could place HTML containing executable JavaScript inside element attributes. This markup becomes unescaped, causing arbitrary markup to be injected into the document.
References
Link | Resource |
---|---|
https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories | Vendor Advisory |
https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P23 | Release Notes Vendor Advisory |
https://wiki.zimbra.com/wiki/Security_Center | Release Notes Vendor Advisory |
https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P16 | Release Notes Vendor Advisory |
https://blog.sonarsource.com/zimbra-webmail-compromise-via-email | Exploit Mitigation Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2021-07-02 12:15
Updated : 2022-04-06 09:47
NVD link : CVE-2021-35208
Mitre link : CVE-2021-35208
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
zimbra
- collaboration