Zimbra.Collaboration.httpPost.jsp.SSRF
Description
This indicates an attack attempt to exploit a Server-Side Request Forgery vulnerability in Zimbra Collaboration.
The vulnerability is due to insufficient validation of user-supplied input. An unauthenticated remote attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in server-side request forgery, potentially allowing access to internal network services and sensitive information, and enabling further compromise depending on reachable internal endpoints.
Affected Products
Zimbra Collaboration prior to 8.8.15 Patch 7, when the WebEx zimlet is installed and zimlet JSP is enabled.
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P7
Coverage
| IPS (Regular DB) | |
| IPS (Extended DB) |