[Users] Zimbra vulnerability fix in the new patches released today

L Mark Stone lmstone at lmstone.com
Thu Jun 4 16:03:46 CEST 2020


We did not get any advance notice Fabio.  I can't speak for other Partners.

I have spoken several times with senior Zimbra execs that failing to disclose exploitable security exploits to partners in advance invites bad actors to attempt to perform the exploits.

As a BSP, I was particularly disappointed about the cross-domain GAL search exploit that was fixed in a recent patch.

Usually, we like to test patches before deploying them, but in that case we felt we had no choice but to apply the patch immediately.

Mark

_________________________________________________

L. Mark Stone, Founder

[https://s3.amazonaws.com/public.missioncriticalemail.com/MissionCriticalEmail+Logo-Horizontal-01-Cropped-300x45.png]
North America's Leading Zimbra VAR/BSP/Training Partner
For Companies With Mission-Critical Email Needs
Need more email security & compliance? Ask me about Mimecast!

________________________________
From: Users <users-bounces at lists.zetalliance.org> on behalf of Fabio S. Schmidt <fabio at bktech.com.br>
Sent: Wednesday, June 3, 2020 10:51 PM
To: users <users at lists.zetalliance.org>
Subject: [Users] Zimbra vulnerability fix in the new patches released today

Hello Guys,

Have you seen the 8.8.15 P10 and 9.0 P3 patches released today?

https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P3
https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P10

There is a fix for this vulnerabity mentioned:

https://vulmon.com/vulnerabilitydetails?valert=email&qid=CVE-2020-12846

Zimbra prior to 8.8.15 Patch 10 and 9.x prior to 9.0.0 Patch 3 allows remote code execution via an avatar file. There is potential abuse of /service/upload servlet in the webmail subsystem. A user can upload executable files (exe,sh,bat,jar) in the Contact section of the mailbox as an avatar image for a contact. A user will receive a "Corrupt File" error, but the file is still uploaded and stored locally in /opt/zimbra/data/tmp/upload/, leaving it open to possible remote execution.

Did any partner receive a warning from Zimbra about this before the patches were released?

Best regards.
Fabio S. Schmidt
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.zetalliance.org/pipermail/users_lists.zetalliance.org/attachments/20200604/4401782c/attachment.html>


More information about the Users mailing list