mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
77 lines
2.6 KiB
JSON
77 lines
2.6 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2022-41347",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "An issue was discovered in Zimbra Collaboration (ZCS) 8.8.x and 9.x (e.g., 8.8.15). The Sudo configuration permits the zimbra user to execute the NGINX binary as root with arbitrary parameters. As part of its intended functionality, NGINX can load a user-defined configuration file, which includes plugins in the form of .so files, which also execute as root."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories",
|
|
"refsource": "MISC",
|
|
"name": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories"
|
|
},
|
|
{
|
|
"url": "https://wiki.zimbra.com/wiki/Security_Center",
|
|
"refsource": "MISC",
|
|
"name": "https://wiki.zimbra.com/wiki/Security_Center"
|
|
},
|
|
{
|
|
"url": "https://darrenmartyn.ie/2021/10/25/zimbra-nginx-local-root-exploit/",
|
|
"refsource": "MISC",
|
|
"name": "https://darrenmartyn.ie/2021/10/25/zimbra-nginx-local-root-exploit/"
|
|
},
|
|
{
|
|
"url": "https://github.com/darrenmartyn/zimbra-hinginx",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/darrenmartyn/zimbra-hinginx"
|
|
}
|
|
]
|
|
}
|
|
} |