An open redirect vulnerability exists in the /preauth Servlet in Zimbra Collaboration Suite through 9.0. To exploit the vulnerability, an attacker would need to have obtained a valid zimbra auth token or a valid preauth token. Once the token is obtained, an attacker could redirect a user to any URL via isredirect=1&redirectURL= in conjunction with the token data (e.g., a valid authtoken= value).
The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Link | Tags |
---|---|
https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories | vendor advisory |
https://wiki.zimbra.com/wiki/Security_Center | release notes vendor advisory |
https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P16 | release notes vendor advisory |
https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P23 | release notes vendor advisory |