An open redirect vulnerability exists in the /preauth Servlet in Zimbra Collaboration Suite through 9.0. To exploit the vulnerability, an attacker would need to have obtained a valid zimbra auth token or a valid preauth token. Once the token is obtained, an attacker could redirect a user to any URL via isredirect=1&redirectURL= in conjunction with the token data (e.g., a valid authtoken= value).
                
            References
                    | Link | Resource | 
|---|---|
| https://wiki.zimbra.com/wiki/Security_Center | Release Notes Vendor Advisory | 
| https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P23 | Release Notes Vendor Advisory | 
| https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P16 | Release Notes Vendor Advisory | 
| https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    No history.
Information
                Published : 2021-07-02 19:15
Updated : 2021-07-08 18:57
NVD link : CVE-2021-34807
Mitre link : CVE-2021-34807
CVE.ORG link : CVE-2021-34807
JSON object : View
Products Affected
                zimbra
- collaboration
CWE
                
                    
                        
                        CWE-601
                        
            URL Redirection to Untrusted Site ('Open Redirect')
