First published: Mon Sep 26 2022(Updated: )
An issue was discovered in Zimbra Collaboration (ZCS) 8.8.x and 9.x (e.g., 8.8.15). The Sudo configuration permits the zimbra user to execute the NGINX binary as root with arbitrary parameters. As part of its intended functionality, NGINX can load a user-defined configuration file, which includes plugins in the form of .so files, which also execute as root.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zimbra Collaboration | =8.8.15 | |
Zimbra Collaboration | =9.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-41347.
The severity of CVE-2022-41347 is high with a CVSS score of 7.8.
Zimbra Collaboration 8.8.x (e.g., 8.8.15) and 9.x (e.g., 9.0.0) are affected by this vulnerability.
This vulnerability allows the zimbra user to execute the NGINX binary as root with arbitrary parameters.
Yes, it is recommended to update to the latest version of Zimbra Collaboration to fix this vulnerability.