Two security bugs in Zimbra’s webmail could allow an adversary to access and control mail servers. Although the vulnerabilities have been addressed, they have potentially put thousands of businesses around the world at risk.
Zimbra bug-prone mail servers
SonarSource researchers discovered two different security bugs in the open source webmail platform Zimbra, exploiting what could expose email servers.
Zimbra is a dedicated software suite with a web client and an email server. Besides emails, it also supports chats, document sharing, video conferencing, and integration with other email clients like Mozilla Thunderbird, Apple Mail, and Microsoft Outlook.
Specifically, one of the bugs includes a stored XSS vulnerability (CVE-2021-35208) in the Calendar Invite component. This is a medium-severity bug with a severity score of 5.4.
While the researchers identified the second vulnerability as an SSRF (CVE-2021-35209) allowing bypassing the whitelist. Although exploitation of this bug required the attacker to have authenticated access, the role of the attacker was not important. Thus, combining it with the first bug could allow access to cloud infrastructure and extract sensitive data.
In a real scenario, these bugs could easily trigger large-scale phishing attacks against businesses. Researchers shared technical details about the vulnerabilities in a blog post.
After discovering these bugs, SonarSource contacted Zimbra, who then fixed them both.
According to vendor reviews, Zimbra has fixed the bugs with Zimbra 8.8.15 patch 23 and Zimbra 9.0.0 patch 16.
Considering the severity of the flaws if exploited, all users should update the respective versions to stay safe from potential attacks.
Let us know your thoughts in the comments.