Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-r987-qmxw-4c9c

Опубликовано: 20 дек. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 7.5

Описание

An issue was discovered in the Webmail Classic UI in Zimbra Collaboration (ZCS) 9.0 and 10.0 and 10.1. A Local File Inclusion (LFI) vulnerability exists in the /h/rest endpoint, allowing authenticated remote attackers to include and access sensitive files in the WebRoot directory. Exploitation requires a valid auth token and involves crafting a malicious request targeting specific file paths.

An issue was discovered in the Webmail Classic UI in Zimbra Collaboration (ZCS) 9.0 and 10.0 and 10.1. A Local File Inclusion (LFI) vulnerability exists in the /h/rest endpoint, allowing authenticated remote attackers to include and access sensitive files in the WebRoot directory. Exploitation requires a valid auth token and involves crafting a malicious request targeting specific file paths.

EPSS

Процентиль: 28%
0.00099
Низкий

7.5 High

CVSS3

Дефекты

CWE-829

Связанные уязвимости

CVSS3: 7.5
nvd
около 1 года назад

An issue was discovered in the Webmail Classic UI in Zimbra Collaboration (ZCS) 9.0 and 10.0 and 10.1. A Local File Inclusion (LFI) vulnerability exists in the /h/rest endpoint, allowing authenticated remote attackers to include and access sensitive files in the WebRoot directory. Exploitation requires a valid auth token and involves crafting a malicious request targeting specific file paths.

EPSS

Процентиль: 28%
0.00099
Низкий

7.5 High

CVSS3

Дефекты

CWE-829