vulnerability
Zimbra Collaboration: CVE-2021-35209: Open Redirect vulnerability.
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | Jul 2, 2021 | Jan 10, 2025 | Jul 2, 2025 |
Severity
7
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
Jul 2, 2021
Added
Jan 10, 2025
Modified
Jul 2, 2025
Description
An issue was discovered in proxyservlet.java in the /proxy servlet in zimbra collaboration suite 8.8 before 8.8.15 patch 23 and 9.x before 9.0.0 patch 16. the value of the x-host header overwrites the value of the host header in proxied requests. the value of x-host header is not checked against the whitelist of hosts zimbra is allowed to proxy to (the zimbraproxyalloweddomains setting).
Solution
zimbra-collaboration-upgrade-latest
References
- CWE-918
- CVE-2021-35209
- https://attackerkb.com/topics/CVE-2021-35209
- URL-https://blog.sonarsource.com/zimbra-webmail-compromise-via-email
- URL-https://wiki.zimbra.com/wiki/Security_Center
- URL-https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P23
- URL-https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P16
- URL-https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.