CVE-2023-50808
13.02.2024, 18:15
Zimbra Collaboration before Kepler 9.0.0 Patch 38 GA allows DOM-based JavaScript injection in the Modern UI.
Vendor | Product | Version |
---|---|---|
zimbra | collaboration | 𝑥 < 9.0.0 |
zimbra | collaboration | 9.0.0 |
zimbra | collaboration | 9.0.0:p0 |
zimbra | collaboration | 9.0.0:p1 |
zimbra | collaboration | 9.0.0:p10 |
zimbra | collaboration | 9.0.0:p11 |
zimbra | collaboration | 9.0.0:p12 |
zimbra | collaboration | 9.0.0:p13 |
zimbra | collaboration | 9.0.0:p14 |
zimbra | collaboration | 9.0.0:p15 |
zimbra | collaboration | 9.0.0:p16 |
zimbra | collaboration | 9.0.0:p19 |
zimbra | collaboration | 9.0.0:p2 |
zimbra | collaboration | 9.0.0:p20 |
zimbra | collaboration | 9.0.0:p21 |
zimbra | collaboration | 9.0.0:p23 |
zimbra | collaboration | 9.0.0:p24 |
zimbra | collaboration | 9.0.0:p24.1 |
zimbra | collaboration | 9.0.0:p25 |
zimbra | collaboration | 9.0.0:p26 |
zimbra | collaboration | 9.0.0:p27 |
zimbra | collaboration | 9.0.0:p3 |
zimbra | collaboration | 9.0.0:p30 |
zimbra | collaboration | 9.0.0:p31 |
zimbra | collaboration | 9.0.0:p32 |
zimbra | collaboration | 9.0.0:p33 |
zimbra | collaboration | 9.0.0:p34 |
zimbra | collaboration | 9.0.0:p35 |
zimbra | collaboration | 9.0.0:p36 |
zimbra | collaboration | 9.0.0:p37 |
zimbra | collaboration | 9.0.0:p38 |
zimbra | collaboration | 9.0.0:p4 |
zimbra | collaboration | 9.0.0:p5 |
zimbra | collaboration | 9.0.0:p6 |
zimbra | collaboration | 9.0.0:p7 |
zimbra | collaboration | 9.0.0:p7.1 |
zimbra | collaboration | 9.0.0:p8 |
zimbra | collaboration | 9.0.0:p9 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
- CWE-94 - Improper Control of Generation of Code ('Code Injection')The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
References