Zimbra Collaboration Suite (ZCS) 8.8.15 and 9.0 has mboximport functionality that receives a ZIP archive and extracts files from it. By bypassing authentication (i.e., not having an authtoken), an attacker can upload arbitrary files to the system, leading to directory traversal and remote code execution. NOTE: this issue exists because of an incomplete fix for CVE-2022-27925.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "8.8.15-NA"
},
{
"introduced": "0"
},
{
"last_affected": "8.8.15-p1"
},
{
"introduced": "0"
},
{
"last_affected": "8.8.15-p11"
},
{
"introduced": "0"
},
{
"last_affected": "8.8.15-p20"
},
{
"introduced": "0"
},
{
"last_affected": "8.8.15-p26"
},
{
"introduced": "0"
},
{
"last_affected": "8.8.15-p3"
},
{
"introduced": "0"
},
{
"last_affected": "8.8.15-p30"
},
{
"introduced": "0"
},
{
"last_affected": "8.8.15-p31"
},
{
"introduced": "0"
},
{
"last_affected": "8.8.15-p32"
},
{
"introduced": "0"
},
{
"last_affected": "8.8.15-p5"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-NA"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p1"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p19"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p20"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p23"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p25"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p4"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p7"
}
]
}{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "8.8.15-p10"
},
{
"introduced": "0"
},
{
"last_affected": "8.8.15-p12"
},
{
"introduced": "0"
},
{
"last_affected": "8.8.15-p13"
},
{
"introduced": "0"
},
{
"last_affected": "8.8.15-p14"
},
{
"introduced": "0"
},
{
"last_affected": "8.8.15-p15"
},
{
"introduced": "0"
},
{
"last_affected": "8.8.15-p16"
},
{
"introduced": "0"
},
{
"last_affected": "8.8.15-p17"
},
{
"introduced": "0"
},
{
"last_affected": "8.8.15-p18"
},
{
"introduced": "0"
},
{
"last_affected": "8.8.15-p2"
},
{
"introduced": "0"
},
{
"last_affected": "8.8.15-p23"
},
{
"introduced": "0"
},
{
"last_affected": "8.8.15-p24"
},
{
"introduced": "0"
},
{
"last_affected": "8.8.15-p25"
},
{
"introduced": "0"
},
{
"last_affected": "8.8.15-p27"
},
{
"introduced": "0"
},
{
"last_affected": "8.8.15-p29"
},
{
"introduced": "0"
},
{
"last_affected": "8.8.15-p31\\.1"
},
{
"introduced": "0"
},
{
"last_affected": "8.8.15-p4"
},
{
"introduced": "0"
},
{
"last_affected": "8.8.15-p6"
},
{
"introduced": "0"
},
{
"last_affected": "8.8.15-p7"
},
{
"introduced": "0"
},
{
"last_affected": "8.8.15-p8"
},
{
"introduced": "0"
},
{
"last_affected": "8.8.15-p9"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p10"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p11"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p13"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p14"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p16"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p17"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p18"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p2"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p22"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p24"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p24\\.1"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p3"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p5"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p6"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p8"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p9"
}
]
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-37042.json"
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.8.15-p19"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.8.15-p22"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.8.15-p28"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p12"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p15"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.0.0-p21"
}
]
}
]