CVE-2024-45516

6.1 MEDIUM

📋 TL;DR

A Cross-Site Scripting (XSS) vulnerability in Zimbra Collaboration's Classic UI allows attackers to execute arbitrary JavaScript when users view specially crafted emails. This can lead to session hijacking, data theft, or unauthorized actions within the user's Zimbra session. Affected versions include ZCS 9.0.0 before Patch 43, 10.0.x before 10.0.12, 10.1.x before 10.1.4, and 8.8.15 before Patch 47.

💻 Affected Systems

Products:
  • Zimbra Collaboration Suite (ZCS)
Versions: ZCS 9.0.0 before Patch 43, 10.0.x before 10.0.12, 10.1.x before 10.1.4, 8.8.15 before Patch 47
Operating Systems: All supported Zimbra OS platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Classic UI, not the newer AJAX UI. Requires user to view malicious email.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover, email data exfiltration, credential theft, and lateral movement within the Zimbra environment.

🟠

Likely Case

Session hijacking leading to unauthorized email access, contact list theft, and potential privilege escalation within Zimbra.

🟢

If Mitigated

Limited impact with proper content filtering, network segmentation, and user awareness training.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires sending malicious email to target user who must view it in Classic UI. No authentication needed for initial email delivery.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: ZCS 9.0.0 Patch 43, 10.0.12, 10.1.4, 8.8.15 Patch 47

Vendor Advisory: https://wiki.zimbra.com/wiki/Security_Center

Restart Required: Yes

Instructions:

1. Download appropriate patch from Zimbra support portal. 2. Backup Zimbra installation. 3. Apply patch using zimbra-patch command. 4. Restart Zimbra services.

🔧 Temporary Workarounds

Disable Classic UI

linux

Force all users to use AJAX UI which is not vulnerable

zmprov mcf zimbraFeatureClassicMailEnabled FALSE
zmmailboxdctl restart

Email Content Filtering

all

Implement external email filtering to block malformed HTML tags

🧯 If You Can't Patch

  • Implement network segmentation to isolate Zimbra servers
  • Enable strict Content Security Policy headers

🔍 How to Verify

Check if Vulnerable:

Check Zimbra version against affected ranges: zmcontrol -v

Check Version:

zmcontrol -v

Verify Fix Applied:

Verify version is patched: zmcontrol -v should show 9.0.0_P43, 10.0.12, 10.1.4, or 8.8.15_P47 or later

📡 Detection & Monitoring

Log Indicators:

  • Unusual email viewing patterns
  • Multiple failed login attempts from same session

Network Indicators:

  • Suspicious email attachments with HTML content
  • Outbound connections to unknown domains after email viewing

SIEM Query:

source="zimbra.log" AND "Classic UI" AND "email view" AND suspicious_patterns

🔗 References

📤 Share & Export