Multiple cross-site request forgery (CSRF) vulnerabilities in the Admin Console in Zimbra Collaboration before 8.6.0 Patch 8 allow remote attackers to hijack the authentication of administrators for requests that (1) add, (2) modify, or (3) remove accounts by leveraging failure to use of a CSRF token and perform referer header checks, aka bugs 100885 and 100899.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/95383 | vdb entry third party advisory |
https://wiki.zimbra.com/wiki/Zimbra_Releases/8.6_Patch_8 | patch release notes |
https://bugzilla.zimbra.com/show_bug.cgi?id=100899 | issue tracking |
https://bugzilla.zimbra.com/show_bug.cgi?id=100885 | issue tracking |
https://wiki.zimbra.com/wiki/Zimbra_Releases/8.7.0 | release notes |
http://seclists.org/fulldisclosure/2017/Jan/30 | mailing list exploit vdb entry third party advisory |
https://sysdream.com/news/lab/2017-01-12-cve-2016-3403-multiple-csrf-in-zimbra-administration-interface/ | third party advisory exploit |
https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories | vendor advisory |