HomeCII/OTResearchers Discover Zimbra Vulnerability, Company Responds with Patch

Researchers Discover Zimbra Vulnerability, Company Responds with Patch

Published on

spot_img

A Zimbra vulnerability has been identified by security researchers, highlighting a zero-day cross-site scripting (XSS) bug. Zimbra, a widely used collaboration product, has urged its customers to apply a software patch immediately to prevent potential compromises to user data. The company has emphasized the importance of taking immediate action to protect confidential and integrity user data. This is the second zero-day vulnerability related to Zimbra that has been reported this year.

The previous Zimbra vulnerability was exposed by researchers in February. They discovered a vulnerability in Zimbra’s email platform and provided evidence of a campaign that was actively exploiting it. Volexity’s cybersecurity experts, Steven Adair and Thomas Lancaster, revealed that a threat group known as TEMP_Heretic was responsible for exploiting the vulnerability through targeted spear-phishing attacks. The campaign was initially detected in December 2021 and is believed to have been orchestrated by Chinese cybercriminals.

The current Zimbra vulnerability affects the Collaboration Suite Version 8.8.15 and has the potential to jeopardize the confidentiality and integrity of customer data. It is classified as a zero-day bug, indicating that it was discovered by malicious actors before being publicly disclosed. The vulnerability exploits the trust between different websites by utilizing a cross-site scripting (XSS) technique. XSS attacks involve transferring untrusted scripts from one site to the trusted content of another site without direct compromise to the target site’s HTML files or JavaScript code.

Sophos, an advisory company, explains that XSS attacks allow the injection of rogue JavaScript code into web pages, potentially giving unauthorized access to user accounts on targeted sites. The attackers can then read and modify private data such as account details, login cookies, authentication tokens, and transaction history. To mitigate the Zimbra vulnerability, customers are advised to manually apply the fix, which involves a single-line edit to a specific data file in the product’s installation directory.

Zimbra has fixed the bug in its code, but the updated version has not yet been published. Due to the urgency of the situation, the company recommends that customers manually apply the fix to protect their data. The security alert issued by Zimbra emphasizes the importance of taking immediate action. While the process of applying the fix may not be overly complex for organizations managing their own Zimbra instances or outsourcing their administration, it is crucial to ensure comprehensive protection by applying the fix to all mailbox nodes.

In conclusion, the Zimbra vulnerability poses a significant risk to the confidentiality and integrity of user data. Zimbra has taken steps to address the issue and has urged its customers to apply the software patch immediately. By following the recommended fix, organizations can protect their data from potential exploitation. It is important for Zimbra users to stay vigilant and take proactive measures to safeguard their sensitive information.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...