Intrusion Prevention

Zimbra.Collaboration.Server.Directory.Traversal

Description

This indicates an attack attempt to exploit a Directory Traversal vulnerability in Zimbra Collaboration Server.
The vulnerability is due to insufficient sanitizing of user supplied inputs in the application when handling crafted HTTP requests. A remote attacker can exploit this to gain unauthorized access to sensitive information via a crafted HTTP request. Also, remote attacker can gain administration privileges, gain access to Administration Console, and upload arbitrary files with custom content to vulnerable server, leading to remote code execution.

Affected Products

Zimbra Collaboration Server 7.2.2
Zimbra Collaboration Server 8.0.2

Impact

Information Disclosure: Remote attackers can gain sensitive information from vulnerable systems.
System Compromise: Remote attackers can gain control of vulnerable systems.
Privilege Escalation: Remote attackers can leverage their privilege on the vulnerable systems.

Recommended Actions

Apply the most recent upgrade or patch from the vendor.
http://www.zimbra.com/forums/announcements/67336-critical-security-vulnerability-addressed-7-2-6-8-0-6-maintenance-releases.html
Note: This signature requires "SSL Inspection" in FortiOS 5.0 and above to detect the attack.

CVE References

CVE-2013-7091