NA

CVE-2022-37393

Published: 16/08/2022 Updated: 18/08/2022
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

Zimbra's sudo configuration permits the zimbra user to execute the zmslapd binary as root with arbitrary parameters. As part of its intended functionality, zmslapd can load a user-defined configuration file, which includes plugins in the form of .so files, which also execute as root.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

zimbra collaboration 9.0.0

zimbra collaboration 8.8.15

zimbra collaboration 8.7.6

zimbra collaboration 8.7.7

zimbra collaboration 8.7.9

zimbra collaboration 8.7.10

zimbra collaboration 8.7.11

zimbra collaboration 8.8.0

zimbra collaboration 8.8.2

zimbra collaboration 8.8.3

zimbra collaboration 8.8.4

zimbra collaboration 8.8.6

zimbra collaboration 8.8.7

zimbra collaboration 8.8.8

zimbra collaboration 8.8.9

zimbra collaboration 8.8.10

zimbra collaboration 8.8.11

zimbra collaboration 8.8.12

Exploits

This Metasploit module exploits CVE-2022-37393, which is a vulnerability in Zimbra's sudo configuration that permits the zimbra user to execute the zmslapd binary as root with arbitrary parameters As part of its intended functionality, zmslapd can load a user-defined configuration file, which includes plugins in the form of so files, which also e ...

Github Repositories

Mars repo

Zimbra Installation This is a guide to reproduce a vulnerable zimbra containing the CVE-2022-37042 and CVE-2022-37393 vulnerabilities Future Deprecation Solution NoteContinue to normal installation unless you already did and installation failed because of missing packages If one or more needed packages have been deleted from the official zimbra 8 repository, you can refer to