Groupware Zimbra: Updates patch several security vulnerabilities

In the groupware Zimbra, developers have closed several security vulnerabilities with updated packages.

listen Print view
Email,Marketing,Concept,,Company,Sending,Many,E-mails,Or,Digital,Newsletter

(Image: Shutter z/Shutterstock.com)

2 min. read

The developers of the groupware Zimbra have released updated software packages. They close several security vulnerabilities at once. IT managers should apply the updates quickly.

The changelogs for the now available versions 10.0.18 and 10.1.13 indicate a larger number of security vulnerabilities that have been closed. For version 10.0.18, these are:

  • AntiSamy updated to version 1.7.8 and stored cross-site scripting vulnerability removed
  • Path check introduced into the ExportAndDeleteItemsRequest API to prevent insecure file exports
  • A CSRF enforcement issue in certain authentication flows addressed
  • Local file inclusion vulnerability without prior authentication resolved in RestFilter
  • Nginx module updated to comply with security standards and compliance

Version 10.1.13 closes even more security vulnerabilities, in addition to the aforementioned ones:

  • Hardcoded Flickr API credentials removed from the Flickr Zimlet and these were withdrawn
  • Stored cross-site scripting vulnerability in the Zimbra Mail client for emails with PDF attachments corrected
  • Input and “null” checks added in the PreAuthServlet to prevent disclosure of internal errors through malformed requests
  • An admin account enumeration issue resolved
  • Apache HttpClient library updated to version 4.5.14

The developers are not yet providing exact details on the closed security vulnerabilities and the CVE entries. However, vulnerabilities in Zimbra are often target of attacks by cybercriminals – also because some government agencies, for example in the EU, work with the groupware Zimbra.

Videos by heise

However, the CERT-Bund of the Federal Office for Information Security (BSI) rates the severity of the vulnerabilities up to a CVSS score of 9.8, i.e., risk “critical.” The analysts assume that attackers can use the security vulnerabilities to execute arbitrary malicious code and bypass security measures, among other things.

(dmk)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.