9.8
CVSSv3

CVE-2022-37042

Published: 12/08/2022 Updated: 08/08/2023
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

Zimbra Collaboration Suite (ZCS) 8.8.15 and 9.0 has mboximport functionality that receives a ZIP archive and extracts files from it. By bypassing authentication (i.e., not having an authtoken), an attacker can upload arbitrary files to the system, leading to directory traversal and remote code execution. NOTE: this issue exists because of an incomplete fix for CVE-2022-27925.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

zimbra collaboration 9.0.0

zimbra collaboration 8.8.15

Github Repositories

A cheat sheet that contains common enumeration and attack methods for Mail Server.

Mail-Server-Attacks-Cheat-Sheet A cheat sheet that contains common enumeration and attack methods for Mail Server Brought to you by: HADESS performs offensive cybersecurity services through infrastructures and software that include vulnerability analysis, scenario attack planning, and implementation of custom integrated preventive projects We organized our activities around

CVE-2022-37042 Zimbra Auth Bypass leads to RCE

CVE-2022-37042 Usage 查看漏洞信息。 go run maingo -s _______ ________ ___ ____ ___ ___ ______________ __ __ ___ / ____/ | / / ____/ |__ \ / __ \__ \|__ \ |__ /__ / __ \/ // /|__ \ / / | | / / __/________/ // / / /_/ /__/ /_____ /_ < / / / / / // /___/ / / /___ | |/ / /__/_____/ __// /_/ / __// __/_____/__/ / / / /_/ /__ __/ __/ \__

Collection of templates from various resources

nuclei_templates Collection of Nuclei Template githubcom/ayadim/Nuclei-bug-hunter githubcom/pikpikcu/nuclei-templates githubcom/esetal/nuclei-bb-templates githubcom/ARPSyndicate/kenzer-templates githubcom/medbsq/ncl githubcom/notnotnotveg/nuclei-custom-templates githubcom/foulenzer/foulenzer-templates github

Zimbra CVE-2022-27925 PoC

CVE-2022-27925 Description On May 10, 2022, Zimbra released versions 900 patch 24 and 8815 patch 31 to address multiple vulnerabilities in Zimbra Collaboration Suite, including CVE-2022-27924 (which we wrote about previously) and CVE-2022-27925 Originally, Zimbra called CVE-2022-27925 an authenticated path-traversal attack, where an administrative user could write files in

githubcom/pikpikcu/nuclei-templates githubcom/esetal/nuclei-bb-templates githubcom/ARPSyndicate/kenzer-templates githubcom/medbsq/ncl githubcom/notnotnotveg/nuclei-custom-templates githubcom/clarkvoss/Nuclei-Templates githubcom/z3bd/nuclei-templates githubcom/peanuth8r/Nuclei_Templates githubcom/th

nulcei-templates-collection Directories to exclude exclude-dirs: SOMETHING Files to exclude exclude-files: READMEmd gitignore pre-commit-configyaml LICENSE Add github urls community-templates: githubcom/AshiqurEmon/nuclei_templatesgit githubcom/0x727/ObserverWard_0x727 githubcom/0XParthJ/Nuclei-Templates githubcom/Elsfa7-110/mynucle

Zimbra CVE-2022-37042 Nuclei weaponized template

CVE-2022-37042 Zimbra CVE-2022-37042 Nuclei weaponized template shell path: /public/formatterjsp Nuclei itself: githubcom/projectdiscovery/nuclei shell have hidden input with 0 opacity, so just hover mouse over it, type command, then press [Enter] key: example shell url: ms1fissioncom:8443/public/formatterjsp?cmd=id

CVE-2022-27925

Explotación Activa Sobre Zimbra CVE-2022-37042 (RCE Unauthenticated) La siguiente investigación inicio tratando de entender las POC de varios repositorios en GitHub que compartieron muchos investigadores y termino en una sorpresa interesante, que compartiré en los siguientes parrafos El 10 de agosto del presente año el grupo de investigación

githubcom/pikpikcu/nuclei-templates githubcom/esetal/nuclei-bb-templates githubcom/ARPSyndicate/kenzer-templates githubcom/medbsq/ncl githubcom/notnotnotveg/nuclei-custom-templates githubcom/foulenzer/foulenzer-templates githubcom/clarkvoss/Nuclei-Templates githubcom/z3bd/nuclei-templates githubcom

Recent Articles

If you haven't patched Zimbra holes by now, assume you're toast
The Register • Jessica Lyons Hardcastle • 01 Jan 1970

Topics Security Off-Prem On-Prem Software Offbeat Vendor Voice Vendor Voice Resources Here's how to detect an intrusion via vulnerable email systems How do you choose a Cloud Security Provider?

Organizations that didn't immediately patch their Zimbra email systems should assume miscreants have already found and exploited the bugs, and should start hunting for malicious activity across IT networks, according to Uncle Sam. In a security alert updated on Monday, the US government's Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing and Analysis Center (MS-ISAC) warned that cybercriminals are actively exploiting five vulnerabilities in the Zimbr...