Description
An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0. The zmmailboxdmgr binary, a component of ZCS, is intended to be executed by the zimbra user with root privileges for specific mailbox operations. However, an attacker can escalate privileges from the zimbra user to root, because of improper handling of input arguments. An attacker can execute arbitrary commands with elevated privileges, leading to local privilege escalation.
CVSS Metrics
- Vector
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Attack Vector
- local
- Complexity
- low
- Privileges
- low
- User Action
- none
- Scope
- unchanged
- Confidentiality
- high
- Integrity
- high
- Availability
- high
- Weaknesses
- CWE-755CWE-269
Metadata
- Primary Vendor
- ZIMBRA
- Published
- 8/12/2024
- Last Modified
- 8/13/2024
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
zimbra : collaborationzimbra : collaborationzimbra : collaborationzimbra : collaborationzimbra : collaborationzimbra : collaborationzimbra : collaborationzimbra : collaborationzimbra : collaborationzimbra : collaborationzimbra : collaborationzimbra : collaborationzimbra : collaborationzimbra : collaborationzimbra : collaborationzimbra : collaborationzimbra : collaborationzimbra : collaborationzimbra : collaborationzimbra : collaborationzimbra : collaborationzimbra : collaborationzimbra : collaborationzimbra : collaborationzimbra : collaborationzimbra : collaborationzimbra : collaborationzimbra : collaborationzimbra : collaborationzimbra : collaborationzimbra : collaborationzimbra : collaborationzimbra : collaborationzimbra : collaborationzimbra : collaborationzimbra : collaborationzimbra : collaborationzimbra : collaboration
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.