CVE-2023-29382
Zimbra Collaboration Server vulnerability analysis and mitigation

Overview

A critical vulnerability (CVE-2023-29382) was discovered in Zimbra Collaboration ZCS versions 8.8.15 and 9.0, which allows an attacker to execute arbitrary code via the sfdc_preauth.jsp component. The vulnerability was disclosed in July 2023 (NVD).

Technical details

The vulnerability has been assigned a CVSS v3.1 base score of 9.8 (CRITICAL) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating that it can be exploited remotely with low attack complexity and requires no privileges or user interaction. The vulnerability is classified under CWE-94 (Improper Control of Generation of Code) (NVD).

Impact

The vulnerability allows attackers to execute arbitrary code on affected systems, potentially leading to complete system compromise. The CVSS score of 9.8 indicates high impact ratings for confidentiality, integrity, and availability (NVD).

Mitigation and workarounds

Zimbra has addressed this vulnerability by removing the unused JSP file which may bypass the Preauth verification. Users are advised to upgrade to Zimbra Collaboration versions 10.0.1, 9.0.0 Patch 33, or 8.8.15 Patch 40 which contain the security fix (Zimbra Security).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management