Zimbra Collaboration revealed three new security vulnerabilities identified as CVE-2024-33533, CVE-2024-33535, and CVE-2024-33536, affecting versions 9.0 and 10.0, which could put users at risk of cross-site scripting and local file inclusion attacks.
Technical Breakdown of the Vulnerabilities:
By infosecbulletin
/ Tuesday , April 1 2025
Israeli cybersecurity firm Check Point has responded to a hacker who claimed to have stolen valuable information from its systems....
Read More
By infosecbulletin
/ Tuesday , April 1 2025
Apple has issued an urgent security advisory about 3 critical zero-day vulnerabilities—CVE-2025-24200, CVE-2025-24201, and CVE-2025-24085—that are being actively exploited in...
Read More
By infosecbulletin
/ Tuesday , April 1 2025
GreyNoise has detected a sharp increase in login scanning aimed at Palo Alto Networks PAN-OS GlobalProtect portals. In the past...
Read More
By infosecbulletin
/ Monday , March 31 2025
Canon has announced a critical security vulnerability, CVE-2025-1268, in printer drivers for its production printers, multifunction printers, and laser printers....
Read More
By infosecbulletin
/ Sunday , March 30 2025
RamiGPT is an AI security tool that targets root accounts. Using PwnTools and OpwnAI, it quickly navigated privilege escalation scenarios...
Read More
By infosecbulletin
/ Sunday , March 30 2025
Cybersecurity researcher Jeremiah Fowler recently revealed a sensitive data exposure involving the Australian fintech company Vroom by YouX, previously known...
Read More
By infosecbulletin
/ Sunday , March 30 2025
Safety Detectives' Cybersecurity Team found a forum post where a threat actor shared a .CSV file with over 200 million...
Read More
By infosecbulletin
/ Saturday , March 29 2025
The Federal Bureau of Investigation (FBI) is probing the cyberattack at Oracle (ORCL.N), opens new tab that has led to...
Read More
By infosecbulletin
/ Thursday , March 27 2025
OpenAI has increased its maximum bug bounty payout to $100,000, up from $20,000, to encourage the discovery of critical vulnerabilities...
Read More
By infosecbulletin
/ Thursday , March 27 2025
Splunk has released a security advisory about critical vulnerabilities in Splunk Enterprise and Splunk Cloud Platform. These issues could lead...
Read More
CVE-2024-33533: The Zimbra webmail admin interface has a vulnerability. It doesn’t properly validate the ‘packages’ parameter. An attacker who is authenticated could exploit this vulnerability to inject and run harmful JavaScript code in another user’s browser session.
CVE-2024-33535: There is a flaw in a web application that allows unauthenticated local file inclusion. This flaw is related to how the ‘packages’ parameter is handled. An attacker can use this vulnerability to include any local file without authentication. This could give them unauthorized access to sensitive information in a specific directory.
CVE-2024-33536: This vulnerability allows an attacker to execute arbitrary JavaScript code in another user’s browser session. It occurs due to insufficient input validation of the ‘res’ parameter, similar to CVE-2024-33533.
Immediate Action Required:
Zimbra Collaboration users are strongly advised to promptly install the latest security patches due to the severity of new vulnerabilities. Failure to do so could lead to data breaches, compromised systems, and major operational issues.
Security experts stress the importance of promptly applying patches once they are released. They advise organizations using Zimbra Collaboration Suite to review their security policies and practices to reduce potential risks.
Organizations using Zimbra Collaboration Suite should stay alert and proactive by applying security updates and monitoring for any suspicious activity. To prevent cross-site scripting threats, it’s important to use strong input validation and output encoding practices.