Zimbra Collaboration Suite LFI 漏洞深度剖析 (CVE-2025-68645)

4 阅读1分钟

🔥 CVE-2025-68645: Zimbra Collaboration Suite — Local File Inclusion (LFI)

-------------------- | -------------------------- | | CVE ID | CVE-2025-68645 | | Vulnerability Type | Local File Inclusion (LFI) | | Severity | High | | CVSS v3.1 Score | 8.8 / 10 | | Attack Vector | Network (Unauthenticated) | | Privileges Required | None | | User Interaction | None |

🛠️ Technical Breakdown

The vulnerability exists due to improper input validation in the RestFilter servlet.

📌 What goes wrong?

  • User-controlled parameters are not correctly sanitized.
  • Internal request routing can be manipulated.
  • Arbitrary files under the WebRoot directory may be included in server responses.

📌 Why it matters

  • No authentication required
  • Remote exploitation possible
  • High impact in exposed mail servers

📊 Risk Summary

Exposure        ██████████  High
Exploitability  ██████████  Easy
Impact          █████████░  Significant
Urgency         ██████████  Immediate

🧠 Defender’s Tip

If you’re running Zimbra on an internet-facing mail server, treat this CVE as high-priority, even if no exploit PoC is public yet. LFI flaws are frequently weaponized quickly.

FINISHED 6HFtX5dABrKlqXeO5PUv/84SoIo+TE3firf/5vX8AZ4es/uvIl63jiuNHmCNMZnk