An issue was discovered in Zimbra Collaboration (ZCS) 8.8.x and 9.x (e.g., 8.8.15). The Sudo configuration permits the zimbra user to execute the NGINX binary as root with arbitrary parameters. As part of its intended functionality, NGINX can load a user-defined configuration file, which includes plugins in the form of .so files, which also execute as root.
References
Link | Resource |
---|---|
https://darrenmartyn.ie/2021/10/25/zimbra-nginx-local-root-exploit/ | Exploit Third Party Advisory |
https://github.com/darrenmartyn/zimbra-hinginx | Third Party Advisory |
https://wiki.zimbra.com/wiki/Security_Center | Patch Vendor Advisory |
https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-09-26T01:29:48
Updated: 2022-09-26T01:29:48
Reserved: 2022-09-26T00:00:00
Link: CVE-2022-41347
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-09-26T02:15:10.620
Modified: 2022-09-28T17:04:56.527
Link: CVE-2022-41347
JSON object: View
Redhat Information
No data.
CWE