Zimbra Collaboration revealed three new security vulnerabilities identified as CVE-2024-33533, CVE-2024-33535, and CVE-2024-33536, affecting versions 9.0 and 10.0, which could put users at risk of cross-site scripting and local file inclusion attacks.
Technical Breakdown of the Vulnerabilities:
By infosecbulletin
/ Sunday , December 22 2024
A major security flaw in Craft CMS, a popular PHP content management system, has been found, enabling unauthenticated remote code...
Read More
By infosecbulletin
/ Sunday , December 22 2024
Mastercard has completed its acquisition of Recorded Future, an AI-based threat intelligence provider. Mastercard has acquired the company for $2.65...
Read More
By infosecbulletin
/ Saturday , December 21 2024
CISA has released eight advisories on vulnerabilities in Industrial Control Systems (ICS). These vulnerabilities affect essential software and hardware in...
Read More
By infosecbulletin
/ Friday , December 20 2024
Bank Rakyat Indonesia (BRI), the largest state bank by assets, has assured customers that their data and funds are secure...
Read More
By infosecbulletin
/ Friday , December 20 2024
Cybersecurity researcher Jeremiah Fowler reported to Website Planet that he found a non-password-protected 1.2 TB dataset containing over 3 million...
Read More
By infosecbulletin
/ Friday , December 20 2024
Sophos has fixed three separate security vulnerabilities in Sophos Firewall. The vulnerabilities CVE-2024-12727, CVE-2024-12728, and CVE-2024-12729 present major risks, such...
Read More
By infosecbulletin
/ Thursday , December 19 2024
A time-demanding workshop on "Cybersecurity Awareness and Needs Analysis" was held on Thursday (December 19) at Bangladesh Bank Training Academy...
Read More
By infosecbulletin
/ Thursday , December 19 2024
Kaspersky's Global Emergency Response Team (GERT) found that attackers are exploiting a patched SQL injection vulnerability (CVE-2023-48788) in Fortinet FortiClient...
Read More
By infosecbulletin
/ Wednesday , December 18 2024
The US government is considering banning a well-known brand of Chinese-made home internet routers TP-Link due to concerns that they...
Read More
By infosecbulletin
/ Wednesday , December 18 2024
Every day a lot of cyberattack happen around the world including ransomware, Malware attack, data breaches, website defacement and so...
Read More
CVE-2024-33533: The Zimbra webmail admin interface has a vulnerability. It doesn’t properly validate the ‘packages’ parameter. An attacker who is authenticated could exploit this vulnerability to inject and run harmful JavaScript code in another user’s browser session.
CVE-2024-33535: There is a flaw in a web application that allows unauthenticated local file inclusion. This flaw is related to how the ‘packages’ parameter is handled. An attacker can use this vulnerability to include any local file without authentication. This could give them unauthorized access to sensitive information in a specific directory.
CVE-2024-33536: This vulnerability allows an attacker to execute arbitrary JavaScript code in another user’s browser session. It occurs due to insufficient input validation of the ‘res’ parameter, similar to CVE-2024-33533.
Immediate Action Required:
Zimbra Collaboration users are strongly advised to promptly install the latest security patches due to the severity of new vulnerabilities. Failure to do so could lead to data breaches, compromised systems, and major operational issues.
Security experts stress the importance of promptly applying patches once they are released. They advise organizations using Zimbra Collaboration Suite to review their security policies and practices to reduce potential risks.
Organizations using Zimbra Collaboration Suite should stay alert and proactive by applying security updates and monitoring for any suspicious activity. To prevent cross-site scripting threats, it’s important to use strong input validation and output encoding practices.