mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-31 10:40:54 +00:00
2.0 KiB
2.0 KiB
CVE-2022-37042
Description
Zimbra Collaboration Suite (ZCS) 8.8.15 and 9.0 has mboximport functionality that receives a ZIP archive and extracts files from it. By bypassing authentication (i.e., not having an authtoken), an attacker can upload arbitrary files to the system, leading to directory traversal and remote code execution. NOTE: this issue exists because of an incomplete fix for CVE-2022-27925.
POC
Reference
Github
- https://github.com/0xf4n9x/CVE-2022-37042
- https://github.com/2lambda123/zw1tt3r1on-Nuclei-Templates-Collection
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/GreyNoise-Intelligence/Zimbra_CVE-2022-37042-_CVE-2022-27925
- https://github.com/Josexv1/CVE-2022-27925
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/SYRTI/POC_to_review
- https://github.com/Shakilll/nulcei-templates-collection
- https://github.com/WhooAmii/POC_to_review
- https://github.com/aels/CVE-2022-37042
- https://github.com/cybershadowvps/Nuclei-Templates-Collection
- https://github.com/emadshanab/Nuclei-Templates-Collection
- https://github.com/h0tak88r/nuclei_templates
- https://github.com/jam620/Zimbra
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/trhacknon/Pocingit
- https://github.com/whoforget/CVE-POC
- https://github.com/xm1k3/cent
- https://github.com/youwizard/CVE-POC
- https://github.com/zecool/cve