{"vulnerability": "CVE-2024-45518", "sightings": [{"uuid": "3d0eccad-f043-4d27-934f-aa3bb6de2176", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45518", "type": "seen", "source": "https://t.me/cvedetector/8637", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-45518 - Zimbra Collaboration SSRFleading to RCE\", \n  \"Content\": \"CVE ID : CVE-2024-45518 \nPublished : Oct. 22, 2024, 5:15 p.m. | 44\u00a0minutes ago \nDescription : An issue was discovered in Zimbra Collaboration (ZCS) 10.1.x before 10.1.1, 10.0.x before 10.0.9, 9.0.0 before Patch 41, and 8.8.15 before Patch 46. It allows authenticated users to exploit Server-Side Request Forgery (SSRF) due to improper input sanitization and misconfigured domain whitelisting. This issue permits unauthorized HTTP requests to be sent to internal services, which can lead to Remote Code Execution (RCE) by chaining Command Injection within the internal service. When combined with existing XSS vulnerabilities, this SSRF issue can further facilitate Remote Code Execution (RCE). \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-22T20:28:39.000000Z"}]}