CVE-2022-37042

Zimbra Collaboration Suite (ZCS) 8.8.15 and 9.0 has mboximport functionality that receives a ZIP archive and extracts files from it. By bypassing authentication (i.e., not having an authtoken), an attacker can upload arbitrary files to the system, leading to directory traversal and remote code execution. NOTE: this issue exists because of an incomplete fix for CVE-2022-27925.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:zimbra:collaboration:8.8.15:-:*:*:*:*:*:*
cpe:2.3:a:zimbra:collaboration:9.0.0:-:*:*:*:*:*:*

History

21 Nov 2024, 07:14

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/168146/Zimbra-Zip-Path-Traversal.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/168146/Zimbra-Zip-Path-Traversal.html - Exploit, Third Party Advisory, VDB Entry
References () https://wiki.zimbra.com/wiki/Security_Center - Patch, Vendor Advisory () https://wiki.zimbra.com/wiki/Security_Center - Patch, Vendor Advisory
References () https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories - Vendor Advisory () https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories - Vendor Advisory

08 Aug 2023, 14:22

Type Values Removed Values Added
CWE CWE-287 CWE-22

Information

Published : 2022-08-12 15:15

Updated : 2024-11-21 07:14


NVD link : CVE-2022-37042

Mitre link : CVE-2022-37042

CVE.ORG link : CVE-2022-37042


JSON object : View

Products Affected

zimbra

  • collaboration
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')