An issue was discovered in Zimbra Collaboration (ZCS) 8.8.x and 9.x (e.g., 8.8.15). The Sudo configuration permits the zimbra user to execute the NGINX binary as root with arbitrary parameters. As part of its intended functionality, NGINX can load a user-defined configuration file, which includes plugins in the form of .so files, which also execute as root.
References
Link | Resource |
---|---|
https://darrenmartyn.ie/2021/10/25/zimbra-nginx-local-root-exploit/ | Exploit Third Party Advisory |
https://github.com/darrenmartyn/zimbra-hinginx | Third Party Advisory |
https://wiki.zimbra.com/wiki/Security_Center | Patch Vendor Advisory |
https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2022-09-26 02:15
Updated : 2024-02-28 19:29
NVD link : CVE-2022-41347
Mitre link : CVE-2022-41347
CVE.ORG link : CVE-2022-41347
JSON object : View
Products Affected
zimbra
- collaboration
CWE