The vulnerability tracked as CVE-2025-25064 impacts the ZimbraSync Service SOAP endpoint in Zimbra Collaboration 10.0.x before 10.0.12 and 10.1.x before 10.1.4. It allows an attacker to inject arbitrary SQL queries.
Stormhield Network Security (SNS) appliance protects you from that attack, thanks to existing IPS signatures. To work efficiently on HTTPS traffic, it must be decrypted.
ID | Name |
http:client:data:17 | SQL injection Prevention – POST : suspicious SELECT statement in data |
http:client:data:18 | SQL injection Prevention – POST : suspicious UPDATE statement in data |
http:client:data:19 | SQL injection Prevention – POST : suspicious DROP statement in data |
http:client:data:20 | SQL injection Prevention – POST : suspicious CREATE statement in data |
http:client:data:21 | SQL injection Prevention – POST : possible version probing in data |
http:client:data:22 | SQL injection Prevention – POST : suspicious OR statement in data |
http:client:data:23 | SQL injection Prevention – POST : suspicious UNION statement in data |
http:client:data:24 | SQL injection Prevention – POST : suspicious EXEC statement in data |
http:client:data:25 | SQL injection Prevention – POST : suspicious OPENROWSET statement in data |
http:client:data:26 | SQL injection Prevention – POST : suspicious OPENQUERY statement in data |
http:client:data:27 | SQL injection Prevention – POST : suspicious HAVING statement in data |
http:client:data:29 | SQL injection Prevention – POST : suspicious INSERT statement in data |
http:client:data:33 | SQL injection Prevention – POST : suspicious DECLARE statement in data |
http:client:data:34 | SQL injection Prevention – POST : suspicious CAST statement in data |
http:client:data:95 | SQL injection Prevention – GET : suspicious SELECT statement in URL |
http:client:data:96 | SQL injection Prevention – GET : suspicious UPDATE statement in URL |
http:client:data:97 | SQL injection Prevention – GET : suspicious DROP statement in URL |
http:client:data:98 | SQL injection Prevention – GET : suspicious CREATE statement in URL |
http:client:data:99 | SQL injection Prevention – GET : possible database version probing |
http:client:data:100 | SQL injection Prevention – GET : suspicious OR statement in URL |
http:client:data:101 | SQL injection Prevention – GET : suspicious UNION statement in URL |
http:client:data:102 | SQL injection Prevention – GET : suspicious EXEC statement in URL |
http:client:data:103 | SQL injection Prevention – GET : suspicious OPENROWSET statement in URL |
http:client:data:104 | SQL injection Prevention – GET : suspicious OPENQUERY statement in URL |
http:client:data:105 | SQL injection Prevention – GET : suspicious combination of ‘OR’ or ‘AND’ statements in URL |
http:client:data:126 | SQL injection Prevention – GET : suspicious shutdown statement in URL |
http:client:data:163 | SQL injection Prevention – GET : suspicious INSERT statement in URL |
http:client:data:183 | SQL injection Prevention – GET : suspicious DECLARE statement in URL |
http:client:data:184 | SQL injection Prevention – GET : suspicious CAST statement in URL |
http:client:data:342 | SQL injection Prevention – GET : suspicious SQL keywords in URL |
http:client:data:432 | SQL injection Prevention – GET : suspicious parameter in an URL parameter |