Zimbra Collaboration Suite (ZCS) 8.8.15 and 9.0 has mboximport functionality that receives a ZIP archive and extracts files from it. By bypassing authentication (i.e., not having an authtoken), an attacker can upload arbitrary files to the system, leading to directory traversal and remote code execution. NOTE: this issue exists because of an incomplete fix for CVE-2022-27925.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/168146/Zimbra-Zip-Path-Traversal.html | Exploit Third Party Advisory VDB Entry |
https://wiki.zimbra.com/wiki/Security_Center | Patch Vendor Advisory |
https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-08-11T19:37:27
Updated: 2022-08-24T14:06:52
Reserved: 2022-08-01T00:00:00
Link: CVE-2022-37042
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-08-12T15:15:16.053
Modified: 2023-08-08T14:22:24.967
Link: CVE-2022-37042
JSON object: View
Redhat Information
No data.
CWE