Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-10949 PoC — Zimbra Collaboration Suite mailboxd 代码问题漏洞

Source
Associated Vulnerability
Title:Zimbra Collaboration Suite mailboxd 代码问题漏洞 (CVE-2018-10949)
Description:Zimbra Collaboration Suite(ZCS)是美国Zimbra公司的一款开源协同办公套件,它包括WebMail、日历、通信录等。mailboxd是其中的一个电子邮件组件。 ZCS 8.8.8之前的8.8版本、8.7.11.Patch3之前的8.7版本和8.6.0.Patch10之前的8.6版本中的mailboxd存在安全漏洞。攻击者可借助返回的‘HTTP 404 -账户未激活’和‘HTTP 401 - 需认证’页面利用该漏洞枚举账户。
Description
Zimbra Collaboration Suite Username Enumeration 
Readme
# Zimbra Collaboration User Enumeration Script (CVE-2018-10949)

## How to use

The argument --host must be the hostname or IP address of Zimbra Collaboration Web Application root page, and --userlist an list of usernames to check against it.
```
root@kali# ./cve-2018-10949-user-enum.py --host http://mail.target.com --userlist /tmp/emails.txt
```

And it should spill out valid e-mails!

References: https://www.cvedetails.com/cve/CVE-2018-10949
File Snapshot

[4.0K] /data/pocs/728b56d6d2b5d63e4ffdc70ba4377ebf29bd3f25 ├── [1.6K] cve-2018-10949-user-enum.py └── [ 448] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.