VMware Zimbra Collection Suite 6.0.16 Web Application ZM_AUTH_TOKEN improper authentication
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 4.9 | $0-$5k | 0.00 |
Summary
A vulnerability has been found in VMware Zimbra Collection Suite 6.0.16 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Web Application. The manipulation of the argument ZM_AUTH_TOKEN leads to improper authentication. This vulnerability is uniquely identified as CVE-2013-5119. The attack is possible to be carried out remotely. Moreover, an exploit is present. The affected component should be upgraded.
Details
A vulnerability, which was classified as critical, has been found in VMware Zimbra Collection Suite 6.0.16 (Groupware Software). This issue affects an unknown part of the component Web Application. The manipulation of the argument ZM_AUTH_TOKEN with an unknown input leads to a improper authentication vulnerability. Using CWE to declare the problem leads to CWE-287. When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct. Impacted is confidentiality, and integrity. The summary by CVE is:
Zimbra Collaboration Suite (ZCS) 6.0.16 and earlier allows man-in-the-middle attackers to obtain access by sniffing the network and replaying the ZM_AUTH_TOKEN token.
The weakness was disclosed 09/13/2013 by Brian Warehime with Aplura LLC as Zimbra Collaboration Suite (ZCS) Session Replay Vulnerability as not defined mailinglist post (Bugtraq). It is possible to read the advisory at seclists.org. The identification of this vulnerability is CVE-2013-5119 since 08/13/2013. The attack may be initiated remotely. A simple authentication is necessary for exploitation. Technical details as well as a public exploit are known.
After immediately, there has been an exploit disclosed. It is declared as proof-of-concept.
Upgrading to version 7.1 eliminates this vulnerability. The upgrade is hosted for download at zimbra.com.
The vulnerability is also documented in the databases at SecurityFocus (BID 62407†) and OSVDB (97290†). seclists.org is providing further details. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.vmware.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.4VulDB Meta Temp Score: 4.9
VulDB Base Score: 5.4
VulDB Temp Score: 4.9
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Improper authenticationCWE: CWE-287
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Access: Public
Status: Proof-of-Concept
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Exploit Delay Time: 🔍
Upgrade: Zimbra Collection Suite 7.1
Timeline
08/13/2013 🔍09/13/2013 🔍
09/13/2013 🔍
09/13/2013 🔍
09/18/2013 🔍
09/23/2013 🔍
05/25/2021 🔍
Sources
Vendor: vmware.comAdvisory: Zimbra Collaboration Suite (ZCS) Session Replay Vulnerability
Researcher: Brian Warehime
Organization: Aplura LLC
Status: Not defined
CVE: CVE-2013-5119 (🔍)
GCVE (CVE): GCVE-0-2013-5119
GCVE (VulDB): GCVE-100-10307
SecurityFocus: 62407 - Zimbra Collaboration Suite Session Replay Security Bypass Vulnerability
OSVDB: 97290
scip Labs: https://www.scip.ch/en/?labs.20060413
Misc.: 🔍
Entry
Created: 09/18/2013 11:06Updated: 05/25/2021 07:27
Changes: 09/18/2013 11:06 (49), 05/10/2018 10:58 (9), 05/25/2021 07:27 (8)
Complete: 🔍
Committer:
Cache ID: 216:E05:103
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.