CVE-2013-7091 Scanner

Detects 'Directory Traversal' vulnerability in Zimbra affects v. 7.2.2 and 8.0.2.

Short Info


Level

Medium

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

15 seconds

Time Interval

8 days 8 hours

Scan only one

Domain, IPv4, Subdomain

Toolbox

-

Zimbra is a widely used email and collaboration software that allows users to manage emails, calendars, contacts, files, and tasks all in one place. With over 100 million users worldwide, Zimbra provides a secure and efficient way for organizations to streamline their communication and collaboration efforts.

One of the vulnerabilities detected in Zimbra is identified by the code CVE-2013-7091. This vulnerability is a directory traversal exploit that allows remote attackers to read arbitrary files by injecting a ".." (dot dot) in the skin parameter of the affected component. This can be exploited to execute arbitrary code by obtaining LDAP credentials and accessing the service/admin/soap API.

When exploited, this vulnerability can lead to the disclosure of sensitive information such as user credentials, personal data, or proprietary information. This can cause significant harm to organizations that rely on Zimbra for their day-to-day operations. Attackers can use the information obtained to launch further attacks or sell it to the highest bidder on the dark web.

With s4e.io, users can easily and quickly learn about vulnerabilities in their digital assets. Our pro features give users access to real-time threat intelligence, customized alerts, and prioritized recommendations to protect against emerging threats. By staying informed and taking proactive measures, organizations can significantly reduce their attack surface and minimize the risk of data breaches and cyber attacks.

 

REFERENCES

Get started to protecting your digital assets