【資安漏洞預警】Zimbra旗下Zimbra Collaboration Suite存在重大資安漏洞(CVE-2025-68645)
[Security Vulnerability Alert] Zimbra's Zimbra Collaboration Suite has a critical cybersecurity vulnerability (CVE-2025-68645).

發布單位:圖資處數位服務組
日期範圍:2025/12/26 ~ 2026/6/26
 
發布單位:圖資處數位服務組
日期範圍:2025/12/26 ~ 2026/6/26
行政 行政公告
全體

轉發 台灣電腦網路危機處理暨協調中心 資安訊息警訊 TWCERTCC-200-202512-00000014

[內容說明]
郵件伺服器系統Zimbra Collaboration Suite的Webmail Classic UI中存在重大本機檔案包含漏洞(Local File Inclusion,LFI),漏洞編號為CVE-2025-68645(CVSS:8.8)。
該漏洞源於RestFilter Servlet對使用者提供的請求參數處理不當,未經身分驗證的遠端攻擊者可對 /h/rest 端點請求,從而影響內部請求分發,包含 WebRoot 目錄中的任意檔案。

[影響平台]
Zimbra Collaboration Suite 10.0版本
Zimbra Collaboration Suite 10.1版本

[建議措施]
根據官方網站釋出解決方式進行修補。

[參考資料]
1. https://www.twcert.org.tw/tw/cp-169-10593-468c8-1.html

Forwarded from Taiwan Computer Network Crisis Management and Coordination Center: Cybersecurity Alert TWCERTCC-200-202512-00000014

[Description]
A critical local file inclusion (LFI) vulnerability exists in the Webmail Classic UI of the Zimbra Collaboration Suite mail server system, with vulnerability number CVE-2025-68645 (CVSS: 8.8).

This vulnerability stems from improper handling of user-supplied request parameters by the RestFilter Servlet. An unauthenticated remote attacker can make requests to the /h/rest endpoint, thereby affecting internal request distribution and including arbitrary files in the WebRoot directory.

[Affected Platforms]
Zimbra Collaboration Suite version 10.0
Zimbra Collaboration Suite version 10.1

[Recommended Actions]
Patch according to the solution released on the official website.

[References]
1. https://www.twcert.org.tw/tw/cp-169-10593-468c8-1.html


相關附件
system_update_alt參考資料
Top↑