vulnerability
Zimbra Collaboration: CVE-2022-41352: Path Traversal vulnerability.
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 10 | (AV:N/AC:L/Au:N/C:C/I:C/A:C) | Sep 26, 2022 | Oct 6, 2022 | Nov 21, 2025 |
Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
Sep 26, 2022
Added
Oct 6, 2022
Modified
Nov 21, 2025
Description
An issue was discovered in zimbra collaboration (zcs) 8.8.15 and 9.0. an attacker can upload arbitrary files through amavis via a cpio loophole (extraction to /opt/zimbra/jetty/webapps/zimbra/public) that can lead to incorrect access to any other user accounts. zimbra recommends pax over cpio. also, pax is in the prerequisites of zimbra on ubuntu; however, pax is no longer part of a default red hat installation after rhel 6 (or centos 6). once pax is installed, amavis automatically prefers it over cpio.
Solution
zimbra-collaboration-upgrade-latest
References
- CWE-22
- CVE-2022-41352
- https://attackerkb.com/topics/CVE-2022-41352
- URL-http://packetstormsecurity.com/files/169458/Zimbra-Collaboration-Suite-TAR-Path-Traversal.html
- URL-https://forums.zimbra.org/viewtopic.php?t=71153&p=306532
- URL-https://wiki.zimbra.com/wiki/Security_Center
- URL-https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories
- URL-https://www.secpod.com/blog/unpatched-rce-bug-in-zimbra-collaboration-suite-exploited-in-wild/
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.