September 29, 2023

Researchers have warned the teams running the Zimbra Collaboration Suite version 8.8.15 to apply a manual fix against a recently discovered zero-day vulnerability (CVE-2023-34192) that’s being actively exploited in the wild.

The Zimbra cloud suite offers email, calendar functions, and other enterprise collaboration tools. The vulnerability compromises the security of data on Zimbra servers, the company said in its security advisory.

The reflected cross-site scripting (XSS) vulnerability was discovered by Google Threat Analysis Group (TAG) researcher Clement, and the zero-day is being targeted in the wild in a July 13 tweet.

Advertisements

Although Zimbra has a fix, it won’t roll out automatically until its scheduled July update, which is why the company is asking customers to manually apply a fix to all mailbox nodes.

The company urges its users take the following steps:

  1. Take a backup of the file /opt/zimbra/jetty/webapps/zimbra/m/momoveto
  2. Edit this file and go to line number 40
  3. Update the parameter value as below
    <input name=”st” type=”hidden” value=”${fn:escapeXml(param.st)}”/>
  4. Before the update, the line appeared as below
    <input name=”st” type=”hidden” value=”${param.st}”/>
  5. After the update, the line should appear as below:
    <input name=”st” type=”hidden” value=”${fn:escapeXml(param.st)}”/>

Leave a Reply

%d bloggers like this: