CVE-2022-41347

HIGH

Zimbra Collaboration <9.x - Privilege Escalation

Title source: llm
STIX 2.1

Description

An issue was discovered in Zimbra Collaboration (ZCS) 8.8.x and 9.x (e.g., 8.8.15). The Sudo configuration permits the zimbra user to execute the NGINX binary as root with arbitrary parameters. As part of its intended functionality, NGINX can load a user-defined configuration file, which includes plugins in the form of .so files, which also execute as root.

References (4)

Core 4
Core References
Patch, Vendor Advisory x_refsource_misc
https://wiki.zimbra.com/wiki/Security_Center
Exploit, Third Party Advisory x_refsource_misc
https://darrenmartyn.ie/2021/10/25/zimbra-nginx-local-root-exploit/

Scores

CVSS v3 7.8
EPSS 0.0015
EPSS Percentile 35.8%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

Status published
Products (2)
zimbra/collaboration 8.8.15
zimbra/collaboration 9.0.0
Published Sep 26, 2022
Tracked Since Feb 18, 2026