QID 377618

Date Published: 2022-10-08

QID 377618: Zimbra Collaboration Remote Code Execution (RCE) Vulnerability

Zimbra is a complete email, address book, calendar and tasks solution that can be accessed from the Zimbra Web Client, Zimbra Desktop offline client, Outlook and a variety of other standards-based email clients and mobile devices.

An attacker can upload arbitrary files through amavisd via a cpio loophole (extraction to /opt/zimbra/jetty/webapps/zimbra/public) that can lead to incorrect access to any other user accounts.

Affected Software:
Zimbra Collaboration Suite 8.8.15
Zimbra Collaboration Suite 9.0

QID Detection Logic:
This QID checks the vulnerable version of Zimbra and the status of pax command.

Successful exploitation could allow an attacker can upload arbitrary files through amavisd via a cpio loophole (extraction to /opt/zimbra/jetty/webapps/zimbra/public) that can lead to incorrect access to any other user accounts.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Critical - 10 severity.
  • Solution
    All Zimbra administrators should make sure the pax package is installed on their Zimbra server. Pax is needed by Amavis to extract the contents of compressed attachments for virus scanning.

    CVEs related to QID 377618

    Software Advisories
    Advisory ID Software Component Link