Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-27925 PoC — Zimbra Collaboration Suite 路径遍历漏洞

Source
Associated Vulnerability
Title:Zimbra Collaboration Suite 路径遍历漏洞 (CVE-2022-27925)
Description:Zimbra Collaboration Suite(ZCS)是美国Zimbra的一款开源协同办公套件。该产品包括WebMail、日历、通信录等。 Zimbra Collaboration Suite 8.8.15 和 9.0 存在路径遍历漏洞,具有管理员权限的经过身份验证的用户能够将任意文件上传到系统,从而导致目录遍历。
Description
A loader for zimbra 2022 rce (cve-2022-27925)
Readme
# CVE-2022-27925 (Zimbra RCE 2022)

This repo is part of the ***hgrab-framework***

### dork
`title: "<title>Zimbra Web Client Sign In</title>"`

### Affected product
  - Zimbra Collaboration Suite Network Edition 9.0.0 Patch 23 (and earlier)
  - Zimbra Collaboration Suite Network Edition 8.8.15 Patch 30 (and earlier)

### Installation
Install the app on the server
```sh
user@domain:~# git clone https://github.com/SystemVll/CVE-2022-27925.git
user@domain:~# cd ./CVE-2022-27925/
user@domain:~# python3 main.py <list.txt> <output> <command>
```

The list file must contain the targets servers with this format `<http-https>://<target>:<port>`

![image](https://user-images.githubusercontent.com/69421356/193409368-c3b2139c-ec37-4261-9536-e43ea8102146.png)
File Snapshot

[4.0K] /data/pocs/4735d0c54e1d5670f540e12bd23c0d64838c23b9 ├── [ 11K] LICENSE ├── [5.4K] main.py └── [ 759] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.