
CVE-2022-37042
- Reference to the description:
- Description:
- Zimbra Collaboration Suite (ZCS) 8.8.15 and 9.0 has mboximport functionality that receives a ZIP archive and extracts files from it. By bypassing authentication (i.e., not having an authtoken), an attacker can upload arbitrary files to the system, leading to directory traversal and remote code execution. NOTE: this issue exists because of an incomplete fix for CVE-2022-27925.
- Last updated date:
- 08/08/2023
Reports

ACTIVELY EXPLOITED
- Type:
- exploitation
- Confidence:
- HIGH
- Date of publishing:
- 08/11/2022
- Reference url to background
https://www.cisa.gov/known-exploited-vulnerabilities-catalog
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 08/18/2022
- Reference url to background
https://github.com/GreyNoise-Intelligence/Zimbra_CVE-2022-37042-_CVE-2022-27925
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 08/22/2022
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 08/25/2022
- Reference url to background
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 10/24/2022
- Reference url to background
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 10/28/2022
- Reference url to background
http://packetstormsecurity.com/files/168146/Zimbra-Zip-Path-Traversal.html