Beyond Security Blog
laptop and network monitoring icons on blue gradient vector

Zimbra before 8.8.15 Patch 10 Unrestricted Upload of File with Dangerous Type Vulnerability

Summary

Zimbra before 8.8.15 Patch 10 and 9.x before 9.0.0 Patch 3 allows remote code execution via an avatar file. There is potential abuse of /service/upload servlet in the webmail subsystem. A user can upload executable files (exe,sh,bat,jar) in the Contact section of the mailbox as an avatar image for a contact.

Credit:

The information has been provided by Vendor

The original article can be found at:https://wiki.zimbra.com/wiki/Security_Center

Details

A user will receive a “Corrupt File” error, but the file is still uploaded and stored locally in /opt/zimbra/data/tmp/upload/, leaving it open to possible remote execution.

Vulnerable Systems:

Zimbra before 8.8.15 Patch 10

Zimbra 9.x before 9.0.0 Patch 3

CVE Information:

CVE-2020-12846

Disclosure Timeline:
Published Date:6/3/2020

SecuriTeam

SecuriTeam is a small group within Beyond Security dedicated to bringing you the latest news and utilities in computer security.

Please visit our central security portal at securiteam.com to keep up-to-date with the latest security research and read our archives containing over 10,000 articles about CVEs and zero-day exploits.

Contact Us

Want to learn more? Fill out the form below and we'll be in touch shortly.

Marketing by
By clicking Submit, I agree to the use of my personal data in accordance with the Beyond Security Privacy Policy. Beyond Security will not sell, trade, lease, or rent your personal data to third parties.

Reviews