Description
An issue was discovered in Zimbra Collaboration (ZCS) 8.8.x and 9.x (e.g., 8.8.15). The Sudo configuration permits the zimbra user to execute the NGINX binary as root with arbitrary parameters. As part of its intended functionality, NGINX can load a user-defined configuration file, which includes plugins in the form of .so files, which also execute as root.
References (4)
Core 4
Core References
Vendor Advisory x_refsource_misc
https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories
Patch, Vendor Advisory x_refsource_misc
https://wiki.zimbra.com/wiki/Security_Center
Exploit, Third Party Advisory x_refsource_misc
https://darrenmartyn.ie/2021/10/25/zimbra-nginx-local-root-exploit/
Third Party Advisory x_refsource_misc
https://github.com/darrenmartyn/zimbra-hinginx
Scores
CVSS v3
7.8
EPSS
0.0015
EPSS Percentile
35.8%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
Status
published
Products (2)
zimbra/collaboration
8.8.15
zimbra/collaboration
9.0.0
Published
Sep 26, 2022
Tracked Since
Feb 18, 2026