Cross-site scripting (XSS) vulnerability in the ZmMailMsgView.getAttachmentLinkHtml function in Zimbra Collaboration Suite (ZCS) before 8.7 Patch 1 and 8.8.x before 8.8.7 might allow remote attackers to inject arbitrary web script or HTML via a Content-Location header in an email attachment.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://seclists.org/fulldisclosure/2018/Mar/52 | third party advisory mailing list |
https://www.securify.nl/advisory/SFY20180101/cross-site-scripting-vulnerability-in-zimbra-collaboration-suite-due-to-the-way-it-handles-attachment-links.html | third party advisory exploit |
https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.7 | permissions required |
https://bugzilla.zimbra.com/show_bug.cgi?id=108786 | issue tracking permissions required |
http://www.securityfocus.com/archive/1/541891/100/0/threaded | mailing list vdb entry third party advisory broken link |
https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories | vendor advisory |