CVE-2024-45515

6.1 MEDIUM

📋 TL;DR

This Cross-Site Scripting (XSS) vulnerability in Zimbra Collaboration allows attackers to upload specially crafted files that bypass content type validation, enabling execution of arbitrary JavaScript in victims' webmail sessions. Attackers can steal session cookies, redirect users, or perform actions on their behalf. All Zimbra Collaboration users with briefcase import functionality are affected.

💻 Affected Systems

Products:
  • Zimbra Collaboration Suite (ZCS)
Versions: All versions through 10.1
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires briefcase import functionality enabled (default).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers steal administrator session cookies, gain full control of Zimbra instance, access all user emails, and potentially pivot to internal networks.

🟠

Likely Case

Attackers steal user session cookies to read emails, send phishing emails from legitimate accounts, or access sensitive attachments.

🟢

If Mitigated

With proper web application firewalls and content security policies, exploitation attempts are blocked, limiting impact to failed attacks.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated user to upload malicious file, but can target other users via stored XSS.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.0.9 and later

Vendor Advisory: https://wiki.zimbra.com/wiki/Zimbra_Releases/10.0.9#Security_Fixes

Restart Required: Yes

Instructions:

1. Backup Zimbra installation and data. 2. Download Zimbra 10.0.9 or later from official sources. 3. Stop Zimbra services. 4. Apply patch/upgrade following Zimbra upgrade documentation. 5. Restart Zimbra services. 6. Verify fix.

🔧 Temporary Workarounds

Disable Briefcase Import

linux

Temporarily disable file import functionality in briefcase to prevent exploitation.

zmprov modifyConfig zimbraFeatureBriefcasesEnabled FALSE
zmmailboxdctl restart

Implement Content Security Policy

all

Add strict CSP headers to prevent JavaScript execution from untrusted sources.

Add to nginx/apache config: add_header Content-Security-Policy "default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval';" always;

🧯 If You Can't Patch

  • Implement web application firewall with XSS protection rules
  • Disable briefcase functionality entirely via admin console

🔍 How to Verify

Check if Vulnerable:

Check Zimbra version: /opt/zimbra/bin/zmcontrol -v. If version is 10.1 or earlier, system is vulnerable.

Check Version:

/opt/zimbra/bin/zmcontrol -v

Verify Fix Applied:

Verify version is 10.0.9 or later: /opt/zimbra/bin/zmcontrol -v. Test briefcase import with various file types.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to briefcase
  • Multiple failed import attempts
  • Suspicious file types with manipulated metadata

Network Indicators:

  • Unexpected JavaScript execution in webmail sessions
  • Unusual outbound connections from Zimbra server

SIEM Query:

source="zimbra.log" AND ("briefcase" OR "import") AND ("error" OR "malformed" OR "metadata")

🔗 References

📤 Share & Export