vendor:
Zimbra Collaboration Suite
by:
rubina119
9
CVSS
CRITICAL
Local File Inclusion
22
CWE
Product Name: Zimbra Collaboration Suite
Affected Version From: 2009
Affected Version To: 2013
Patch Exists: NO
Related CWE: No CVE, no patch just 0Day
CPE: a:zimbra:zimbra_collaboration_suite
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Centos(x), Ubuntu
2013
Zimbra 0day exploit / Privilegie escalation via LFI
This script exploits a Local File Inclusion in /res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKeys,ZdMsg,Ajx%20TemplateMsg.js.zgz which allows us to see localconfig.xml that contains LDAP root credentials wich allow us to make requests in /service/admin/soap API with the stolen LDAP credentials to create user with administration privlegies and gain acces to the Administration Console.
Mitigation:
Before use this exploit, target server must have admin console port open '7071' otherwise it won't work.