Zimbra Collaboration Suite (ZCS) 8.8.15 and 9.0 has mboximport functionality that receives a ZIP archive and extracts files from it. By bypassing authentication (i.e., not having an authtoken), an attacker can upload arbitrary files to the system, leading to directory traversal and remote code execution. NOTE: this issue exists because of an incomplete fix for CVE-2022-27925.
References
Link | Resource |
---|---|
https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories | Vendor Advisory |
https://wiki.zimbra.com/wiki/Security_Center | Patch Vendor Advisory |
http://packetstormsecurity.com/files/168146/Zimbra-Zip-Path-Traversal.html | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-08-12 08:15
Updated : 2022-10-28 06:38
NVD link : CVE-2022-37042
Mitre link : CVE-2022-37042
JSON object : View
CWE
CWE-287
Improper Authentication
Products Affected
zimbra
- collaboration