fkie_cve-2020-12846
Vulnerability from fkie_nvd
Published
2020-06-03 17:15
Modified
2024-11-21 05:00
Severity ?
Summary
Zimbra before 8.8.15 Patch 10 and 9.x before 9.0.0 Patch 3 allows remote code execution via an avatar file. There is potential abuse of /service/upload servlet in the webmail subsystem. A user can upload executable files (exe,sh,bat,jar) in the Contact section of the mailbox as an avatar image for a contact. A user will receive a "Corrupt File" error, but the file is still uploaded and stored locally in /opt/zimbra/data/tmp/upload/, leaving it open to possible remote execution.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://wiki.zimbra.com/wiki/Security_Center | Release Notes, Vendor Advisory | |
cve@mitre.org | https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P3 | Vendor Advisory | |
cve@mitre.org | https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://wiki.zimbra.com/wiki/Security_Center | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P3 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
synacor | zimbra_collaboration_suite | * | |
synacor | zimbra_collaboration_suite | 8.8.15 | |
synacor | zimbra_collaboration_suite | 8.8.15 | |
synacor | zimbra_collaboration_suite | 8.8.15 | |
synacor | zimbra_collaboration_suite | 8.8.15 | |
synacor | zimbra_collaboration_suite | 8.8.15 | |
synacor | zimbra_collaboration_suite | 8.8.15 | |
synacor | zimbra_collaboration_suite | 8.8.15 | |
synacor | zimbra_collaboration_suite | 8.8.15 | |
synacor | zimbra_collaboration_suite | 8.8.15 | |
synacor | zimbra_collaboration_suite | 8.8.15 | |
synacor | zimbra_collaboration_suite | 9.0.0 | |
synacor | zimbra_collaboration_suite | 9.0.0 | |
synacor | zimbra_collaboration_suite | 9.0.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8BF8662-919E-4A40-917F-FEA0EA73491C", "versionEndExcluding": "8.8.15", "vulnerable": true }, { "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.15:-:*:*:*:*:*:*", "matchCriteriaId": "9E39A855-C0EB-4448-AE96-177757C40C66", "vulnerable": true }, { "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.15:p1:*:*:*:*:*:*", "matchCriteriaId": "FFE7BE6E-7A9A-40C7-B236-7A21103E9F41", "vulnerable": true }, { "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.15:p2:*:*:*:*:*:*", "matchCriteriaId": "6FCB5528-70FD-4525-A78B-D5537609331A", "vulnerable": true }, { "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.15:p3:*:*:*:*:*:*", "matchCriteriaId": "EF2EE32D-04A5-46EA-92F0-3C8D74A4B82A", "vulnerable": true }, { "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.15:p4:*:*:*:*:*:*", "matchCriteriaId": "BB3C28CA-4C22-423E-B1C7-CBAFBB91F4DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.15:p5:*:*:*:*:*:*", "matchCriteriaId": "A9A1314A-20C8-42D7-9387-D914999EEAF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.15:p6:*:*:*:*:*:*", "matchCriteriaId": "CEF091C5-8DC6-4A41-9E84-F53BE703F71B", "vulnerable": true }, { "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.15:p7:*:*:*:*:*:*", "matchCriteriaId": "ACD65C28-9716-4073-8613-C4AF12684760", "vulnerable": true }, { "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.15:p8:*:*:*:*:*:*", "matchCriteriaId": "2C58AFFF-848F-490D-A95C-03A267C2DC98", "vulnerable": true }, { "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.15:p9:*:*:*:*:*:*", "matchCriteriaId": "B62DC188-89A8-4AEA-90AE-563F0BBEFC54", "vulnerable": true }, { "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:-:*:*:*:*:*:*", "matchCriteriaId": "32AFCE22-5ADA-4FF7-A165-5EC12B325DEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p1:*:*:*:*:*:*", "matchCriteriaId": "D3577FE6-F1F4-4555-8D27-84D6DE731EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:9.0.0:p2:*:*:*:*:*:*", "matchCriteriaId": "7E7B3976-DA6F-4285-93E6-2328006F7F4D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Zimbra before 8.8.15 Patch 10 and 9.x before 9.0.0 Patch 3 allows remote code execution via an avatar file. There is potential abuse of /service/upload servlet in the webmail subsystem. A user can upload executable files (exe,sh,bat,jar) in the Contact section of the mailbox as an avatar image for a contact. A user will receive a \"Corrupt File\" error, but the file is still uploaded and stored locally in /opt/zimbra/data/tmp/upload/, leaving it open to possible remote execution." }, { "lang": "es", "value": "Zimbra versiones anteriores a 8.8.15 Patch 10 y versiones 9.x anteriores a 9.0.0 Patch 3, permite una ejecuci\u00f3n de c\u00f3digo remota por medio de un archivo de avatar. Se presenta un posible abuso del servlet /service/upload en el subsistema del correo web. Un usuario puede cargar archivos ejecutables (exe, sh, bat, jar) en la secci\u00f3n Contact del buz\u00f3n de correo como una imagen de avatar para un contacto. Un usuario recibir\u00e1 un error de \"Corrupt File\", pero el archivo a\u00fan se carga y es almacenado localmente en /opt/zimbra/data/tmp/upload/, dej\u00e1ndolo abierto para una posible ejecuci\u00f3n remota." } ], "id": "CVE-2020-12846", "lastModified": "2024-11-21T05:00:23.700", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-03T17:15:24.793", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://wiki.zimbra.com/wiki/Security_Center" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P3" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://wiki.zimbra.com/wiki/Security_Center" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-434" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.