Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mrjw-fxfc-2587

Опубликовано: 17 сент. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 6.3

Описание

A Cross-Site Request Forgery (CSRF) vulnerability exists in the ResetPasswordRequest operation of Zimbra Collaboration (ZCS) when the zimbraFeatureResetPasswordStatus attribute is enabled. An attacker can exploit this by tricking an authenticated user into visiting a malicious webpage that silently sends a crafted SOAP request to reset the user's password. The vulnerability stems from a lack of CSRF token validation on the endpoint, allowing password resets without the user's consent.

A Cross-Site Request Forgery (CSRF) vulnerability exists in the ResetPasswordRequest operation of Zimbra Collaboration (ZCS) when the zimbraFeatureResetPasswordStatus attribute is enabled. An attacker can exploit this by tricking an authenticated user into visiting a malicious webpage that silently sends a crafted SOAP request to reset the user's password. The vulnerability stems from a lack of CSRF token validation on the endpoint, allowing password resets without the user's consent.

EPSS

Процентиль: 2%
0.00013
Низкий

6.3 Medium

CVSS3

Дефекты

CWE-352

Связанные уязвимости

CVSS3: 6.3
nvd
5 месяцев назад

A Cross-Site Request Forgery (CSRF) vulnerability exists in the ResetPasswordRequest operation of Zimbra Collaboration (ZCS) when the zimbraFeatureResetPasswordStatus attribute is enabled. An attacker can exploit this by tricking an authenticated user into visiting a malicious webpage that silently sends a crafted SOAP request to reset the user's password. The vulnerability stems from a lack of CSRF token validation on the endpoint, allowing password resets without the user's consent.

EPSS

Процентиль: 2%
0.00013
Низкий

6.3 Medium

CVSS3

Дефекты

CWE-352