Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireCybersecurity News

New bugs could let attackers hijack Zimbra server

cloud-computing-freepik
July 28, 2021

SonarSource cybersecurity researchers have discovered multiple security vulnerabilities in Zimbra - email collaboration software used by global enterprises - that could be potentially exploited to compromise email accounts by sending a malicious message and even achieve a full takeover of the mail server when hosted on a cloud infrastructure.

The first vulnerability is a Cross-Site Scripting bug (CVE-2021-35208) that can be triggered in a victim’s browser when viewing an incoming email. The malicious email would contain a crafted JavaScript payload that, when executed, would provide an attacker with access to all emails of the victim, as well as to their webmail session. With this, other features of Zimbra could be accessed and further attacks could be launched. 

The second vulnerability is an interesting bypass of an allow-list that leads to a powerful Server-Side Request Forgery (SSRF) vulnerability (CVE-2021-35209). It can be exploited by an authenticated member of an organization with any permission role, which means that it can be combined with the first vulnerability. A remote attacker is then able to extract, for example, Google Cloud API Tokens or AWS IAM credentials from instances within the cloud infrastructure.

According to Jonathan Chua, Application Security Consultant at nVisium, a Falls Church, Va.-based application security provider, "an SSRF vulnerability allows an attacker to coerce an application server into performing network requests on the attacker's behalf. This vulnerability may allow attackers to perform malicious network requests under the context of the application server. Application servers often have access to internal network services such as databases, admin panels, and other internal services that normal application users don't have access to."

Michael Isbitski, Technical Evangelist at Salt Security, a Palo Alto, Calif.-based provider of API security, says, "XSS vulnerabilities are unfortunately pretty common due to the large variety of front-end client types for web and mobile, as well as user device types with varying operating systems. Attackers will frequently exploit XSS vulnerabilities to obtain authenticated sessions. The ways that clients sanitize input can vary, which is why it's often recommended to sanitize data in the back-end. The Zimbra developers seemed to follow security best practice here, sanitizing user submitted data in the back-end with a well-vetted OWASP sanitizer library. Unfortunately, one of the Zimbra front-ends transformed the sanitized content in an unsafe way, which led to the XSS issue."

Isbitski explains that SSRF vulnerabilities have been gaining in popularity by attackers because of the extent of damage that can be done in back-end services. He says, "By exploiting an SSRF vulnerability in a back-end service, it's possible to leverage that vulnerable back-end service as a trusted connection to other back-end services and data. We saw this in the case of Capital One in 2019, where an attacker was able to bypass web filtering controls and submit commands to back-end services hosted in AWS. The web filtering mechanism was a trusted resource within Capital One's AWS private cloud segment."

In 2019, assets of Capital One were breached utilizing a similar SSRF vulnerability. Capital One was required to pay $80 million as a penalty. Security researchers have no information whether Zimbra Cloud, a SaaS solution using AWS, was affected by this vulnerability. All issues were fixed by the Zimbra team with Patch 18 for the 8.8.15 series and Patch 16 for the 9.0 series. Prior versions of both branches are vulnerable.

"Cloud service providers make use of these metadata API services since they help facilitate much of automation and elasticity, enabling organizations to spin up infrastructure on demand," Isbitski says. "Attackers know this aspect of cloud infrastructure and the presence of metadata APIs, and they seek SSRF vulnerabilities in order to form complex attack chains that often fly under the radar of traditional security controls. The researchers outlined how the Zimbra XSS and CSRF vulnerabilities could be chained fairly easily, which should raise priority for organizations running Zimbra as their webmail solution. These vulnerabilities are another example of the impacts of digital supply chains. The applications and APIs you procure may have latent weaknesses and vulnerabilities that your organization inherits the moment you deploy."

KEYWORDS: cyber security enterprise security information security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0819-5G-Feat-slide_900px

    Attackers can exploit vulnerabilities in new 5G networks to steal subscriber data and impersonate users

    See More
  • Malware

    Attackers targeting non-governmental organizations in Myanmar with new ‘KilllSomeOne’ backdoor

    See More
  • mozilla firefox

    Firefox for Android vulnerability allows hackers to hijack device over Wi-Fi

    See More

Related Products

See More Products
  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

  • The Database Hacker's Handboo

  • into to sec.jpg

    Introduction to Security, 10th Edition

See More Products

Events

View AllSubmit An Event
  • January 9, 2012

    AVHS: Server Software for Hosting of Video Monitoring Services

    Easy access to security video via the internet is becoming increasingly popular, both for verification of alarms by central alarm stations as well as monitoring small businesses and homes by end customers. AXIS Video Hosting Systems (AVHS) is an easy and cost-effective way to implement true remote monitoring and further develop your business. Learn how you can take advantage of this new product, and capitalize on a fast growing market.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing