New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New module for 0-day Zimbra privilege escalation ("slapper") #16807
Conversation
|
Thanks for your pull request! Before this can be merged, we need the following documentation for your module: |
|
EDIT: Copy/Pasta fail... |
dae8ca2
to
5d7fb28
Compare
|
I just tested against Zimbra Collaboration 8.8.15 Patch 31 on Ubuntu 18.04 and it works great! I used
|
Release NotesThis PR adds a local exploit for Zimbra to go from the zimbra user to root by using a sudo-able executable that can load an arbitrary .so file. |
|
you have resulting indicators of compromise to your test... |
This adds a local exploit for Zimbra, to go from the
zimbrauser torootby using a sudo-able executable that can load an arbitrary .so file. This was publicly disclosed in October of 2021, but I'm not sure that anybody reported it to Zimbra. (I reported it today, have not heard back yet)Note that this is branched off of #16796 since it goes with that module (and is what I'm using for testing) - I'm happy to re-base if that's a problem!
Verification
Install Zimbra (sorry) on any supported Linux version and get a session as the
zimbrauser. I used Ubuntu 18.04 for testing, and then CVE-2022-30333 to exploit, but this will work on a fully patched system as well. Then...