340 lines
12 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2019-9621",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-04-30T18:29:08.633",
"lastModified": "2019-06-06T20:29:02.947",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Zimbra Collaboration Suite before 8.6 patch 13, 8.7.x before 8.7.11 patch 10, and 8.8.x before 8.8.10 patch 7 or 8.8.x before 8.8.11 patch 3 allows SSRF via the ProxyServlet component."
},
{
"lang": "es",
"value": "Zimbra Collaboration Suite anterior de la versi\u00f3n 8.6 path 13, versi\u00f3n 8.7.x anterior de la 8.7.11 path 10, y versi\u00f3n 8.8.x anterior de la 8.8.10 path 7 u versi\u00f3n 8.8.x anterior de la 8.8.11 path 3, permite vulnerabilidad de tipo SSRF por medio del componente ProxyServlet."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration_server:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.6.0",
"matchCriteriaId": "58B5F91A-E6B3-4020-AFAF-AE9830F07203"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.7.0",
"versionEndExcluding": "8.7.11",
"matchCriteriaId": "E1387AC8-F393-421E-A0C6-E9BB1A0FE39D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.8.0",
"versionEndExcluding": "8.8.10",
"matchCriteriaId": "19953218-6103-4689-BE3D-6CC2F240FB3F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration_server:8.6.0:-:*:*:*:*:*:*",
"matchCriteriaId": "34C10FC4-6B08-46EA-9DBC-C38BC51C43DA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration_server:8.6.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "EF7FE7FE-4BFF-4381-94B9-CE59308E0303"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration_server:8.6.0:p10:*:*:*:*:*:*",
"matchCriteriaId": "D4B1DF9D-F603-469D-B5E7-8BFB48517780"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration_server:8.6.0:p11:*:*:*:*:*:*",
"matchCriteriaId": "3B9F25B4-D10E-4C43-8309-C27015B44E1F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration_server:8.6.0:p12:*:*:*:*:*:*",
"matchCriteriaId": "A17C648F-8CFE-4418-8EBF-80757ABF67DA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration_server:8.6.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "CFFD07C7-3E61-4C2C-82C2-4BE0F392BE3D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration_server:8.6.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "63C3A9C3-033B-4730-B1D4-BA4B2EA1E717"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration_server:8.6.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "D45EA214-8E61-46B9-B5E3-E1F2048436C1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration_server:8.6.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "1E341AFD-76EE-4D69-842E-E9E69A6482F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration_server:8.6.0:p6:*:*:*:*:*:*",
"matchCriteriaId": "32B34C20-8F04-419D-8F69-A15DB1BD1DE3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration_server:8.6.0:p7:*:*:*:*:*:*",
"matchCriteriaId": "A1D3A234-603E-47FC-AC89-F868BEF557E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration_server:8.6.0:p8:*:*:*:*:*:*",
"matchCriteriaId": "DB10A55D-3708-4C7E-8B15-C28AFB80ADED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration_server:8.6.0:p9:*:*:*:*:*:*",
"matchCriteriaId": "A1E7168D-2BB7-4CC1-92B3-AFA4CECC4440"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration_server:8.7.11:-:*:*:*:*:*:*",
"matchCriteriaId": "CC3B2D35-FC6E-45CB-A0D1-F3EDD4035094"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration_server:8.7.11:p1:*:*:*:*:*:*",
"matchCriteriaId": "27F59D2D-BE7E-490F-8C7B-09145FF18243"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration_server:8.7.11:p2:*:*:*:*:*:*",
"matchCriteriaId": "B815B700-6242-434E-A4DF-50CAF01F7088"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration_server:8.7.11:p3:*:*:*:*:*:*",
"matchCriteriaId": "EB38E99F-B630-4389-8159-6E8ED61416DA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration_server:8.7.11:p4:*:*:*:*:*:*",
"matchCriteriaId": "D1B6501F-8E63-4672-A40F-D79D068861CD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration_server:8.7.11:p5:*:*:*:*:*:*",
"matchCriteriaId": "815E22AF-7406-4B70-9A85-F9E6B875A3E5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration_server:8.7.11:p6:*:*:*:*:*:*",
"matchCriteriaId": "42C87747-2220-4856-8AEF-EF6F7C889FCC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration_server:8.7.11:p7:*:*:*:*:*:*",
"matchCriteriaId": "E809B8B9-829B-4483-B85C-0B58A73BD24B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration_server:8.7.11:p8:*:*:*:*:*:*",
"matchCriteriaId": "9939EE2E-99C6-4697-9385-E470D31416B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration_server:8.7.11:p9:*:*:*:*:*:*",
"matchCriteriaId": "D42CECDD-9DD7-4C24-ACCD-C2F876A2750F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration_server:8.8.10:-:*:*:*:*:*:*",
"matchCriteriaId": "325FBDCD-13CB-4DC6-BBAA-592F37FDE5C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration_server:8.8.10:p1:*:*:*:*:*:*",
"matchCriteriaId": "19CD7665-5C06-46AF-B2D6-5ED0000AF98C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration_server:8.8.10:p2:*:*:*:*:*:*",
"matchCriteriaId": "A945C9FA-DA43-426D-8E02-4FCBC8A2B8FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration_server:8.8.10:p3:*:*:*:*:*:*",
"matchCriteriaId": "8254749E-E88D-44D5-9644-B6DD3E7574C9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration_server:8.8.10:p4:*:*:*:*:*:*",
"matchCriteriaId": "B468616F-0F41-4F53-98A3-102617A92C59"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration_server:8.8.10:p5:*:*:*:*:*:*",
"matchCriteriaId": "14BEBF0D-F2C1-49D9-A02F-7CD6B4D81D55"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration_server:8.8.10:p6:*:*:*:*:*:*",
"matchCriteriaId": "2C8CF223-3E24-4452-9B3C-701F15680584"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration_server:8.8.11:-:*:*:*:*:*:*",
"matchCriteriaId": "25546B97-61AA-480F-AA66-9F6C0DD25F23"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration_server:8.8.11:p1:*:*:*:*:*:*",
"matchCriteriaId": "CD145A57-203B-450A-B79B-602C66BCE58C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zimbra:collaboration_server:8.8.11:p2:*:*:*:*:*:*",
"matchCriteriaId": "DB0E3CA9-6687-483A-8BC4-6046AC7A846F"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/152487/Zimbra-Collaboration-Autodiscover-Servlet-XXE-ProxyServlet-SSRF.html",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://packetstormsecurity.com/files/153190/Zimbra-XML-Injection-Server-Side-Request-Forgery.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.rapid7.com/db/modules/exploit/linux/http/zimbra_xxe_rce",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://blog.tint0.com/2019/03/a-saga-of-code-executions-on-zimbra.html",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://blog.zimbra.com/2019/03/9826/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://bugzilla.zimbra.com/show_bug.cgi?id=109127",
"source": "cve@mitre.org"
},
{
"url": "https://wiki.zimbra.com/wiki/Security_Center",
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.exploit-db.com/exploits/46693/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
}
]
}