
Cloud Vulnerability DB
A community-led vulnerabilities database
An open redirect vulnerability (CVE-2023-24030) was discovered in the /preauth Servlet in Zimbra Collaboration Suite through versions 9.0 and 8.8.15. The vulnerability requires an attacker to have obtained either a valid zimbra auth token or a valid preauth token before exploitation. Once such a token is acquired, the attacker could potentially redirect users to any URL by bypassing URL sanitization in incoming requests (NVD).
The vulnerability is classified with a CVSS v3.1 Base Score of 6.1 (MEDIUM) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N. It is categorized under CWE-601 (URL Redirection to Untrusted Site). The vulnerability specifically affects the PreAuth servlet functionality and requires strengthening of URL sanitization mechanisms (NVD).
When successfully exploited, the vulnerability allows an attacker to perform URL redirection attacks, potentially leading users to malicious websites. This could result in information disclosure and compromise of user security through phishing attacks or other malicious redirects (NVD).
The vulnerability has been addressed in subsequent patches. The fix involves strengthening the PreAuth servlet to only redirect to admin-configured URLs, which prevents security issues related to open redirection vulnerabilities. Organizations are advised to upgrade to the latest patched versions (Zimbra Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."