CVE-2013-7091 Scanner
Detects 'Directory Traversal' vulnerability in Zimbra affects v. 7.2.2 and 8.0.2.
Short Info
Level
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
15 seconds
Time Interval
8 days 8 hours
Scan only one
Domain, IPv4, Subdomain
Toolbox
-
Zimbra is a widely used email and collaboration software that allows users to manage emails, calendars, contacts, files, and tasks all in one place. With over 100 million users worldwide, Zimbra provides a secure and efficient way for organizations to streamline their communication and collaboration efforts.
One of the vulnerabilities detected in Zimbra is identified by the code CVE-2013-7091. This vulnerability is a directory traversal exploit that allows remote attackers to read arbitrary files by injecting a ".." (dot dot) in the skin parameter of the affected component. This can be exploited to execute arbitrary code by obtaining LDAP credentials and accessing the service/admin/soap API.
When exploited, this vulnerability can lead to the disclosure of sensitive information such as user credentials, personal data, or proprietary information. This can cause significant harm to organizations that rely on Zimbra for their day-to-day operations. Attackers can use the information obtained to launch further attacks or sell it to the highest bidder on the dark web.
With s4e.io, users can easily and quickly learn about vulnerabilities in their digital assets. Our pro features give users access to real-time threat intelligence, customized alerts, and prioritized recommendations to protect against emerging threats. By staying informed and taking proactive measures, organizations can significantly reduce their attack surface and minimize the risk of data breaches and cyber attacks.
REFERENCES