An issue was discovered in ZmMailMsgView.js in the Calendar Invite component in Zimbra Collaboration Suite 8.8.x before 8.8.15 Patch 23. An attacker could place HTML containing executable JavaScript inside element attributes. This markup becomes unescaped, causing arbitrary markup to be injected into the document.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories | vendor advisory |
https://wiki.zimbra.com/wiki/Security_Center | release notes vendor advisory |
https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P16 | release notes vendor advisory |
https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P23 | release notes vendor advisory |
https://blog.sonarsource.com/zimbra-webmail-compromise-via-email | exploit third party advisory mitigation |