CVE-2018-6882
high-risk
Published 2018-03-27
Cross-site scripting (XSS) vulnerability in the ZmMailMsgView.getAttachmentLinkHtml function in Zimbra Collaboration Suite (ZCS) before 8.7 Patch 1 and 8.8.x before 8.8.7 might allow remote attackers to inject arbitrary web script or HTML via a Content-Location header in an email attachment.
Do I need to act?
!
79.5% chance of exploitation in next 30 days
EPSS score — higher than 20% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.1/10
Medium
NETWORK
/ LOW complexity
Affected Products (9)
Affected Vendors
References (13)
Mailing List
http://seclists.org/fulldisclosure/2018/Mar/52
Permissions Required
https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.7
Vendor Advisory
https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories
Mailing List
http://seclists.org/fulldisclosure/2018/Mar/52
Permissions Required
https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.7
Vendor Advisory
https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories
US Government Resource
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-...
65
/ 100
high-risk
Severity
23/34 · High
Exploitability
27/34 · High
Exposure
15/34 · Moderate