Zimbra.Collaboration.httpPost.jsp.SSRF

description-logoDescription

This indicates an attack attempt to exploit a Server-Side Request Forgery vulnerability in Zimbra Collaboration.
The vulnerability is due to insufficient validation of user-supplied input. An unauthenticated remote attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in server-side request forgery, potentially allowing access to internal network services and sensitive information, and enabling further compromise depending on reachable internal endpoints.

affected-products-logoAffected Products

Zimbra Collaboration prior to 8.8.15 Patch 7, when the WebEx zimlet is installed and zimlet JSP is enabled.

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P7

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Status Detail
2026-03-04 35.178
Modified
Default_action:pass:drop
2026-02-24 35.173
New