Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2019-9670 PoC — Zimbra Collaboration Suite 代码问题漏洞

Source
Associated Vulnerability
Title:Zimbra Collaboration Suite 代码问题漏洞 (CVE-2019-9670)
Description:mailboxd component in Synacor Zimbra Collaboration Suite 8.7.x before 8.7.11p10 has an XML External Entity injection (XXE) vulnerability, as demonstrated by Autodiscover/Autodiscover.xml.
Description
Zimbra RCE CVE-2019-9670
Readme
# Zimbra-RCE
Zimbra RCE CVE-2019-9670

```bash
$ ./zimbra.py -h

__________.__       ___.                  ___________________ ___________
\____    /|__| _____\_ |______________    \______   \_   ___ \_   _____/
  /     / |  |/     \| __ \_  __ \__  \    |       _/    \  \/ |    __)_
 /     /_ |  |  Y Y  \ \_\ \  | \// __ \_  |    |   \     \____|        \
/_______ \|__|__|_|  /___  /__|  (____  /  |____|_  /\______  /_______  /
        \/         \/    \/           \/          \/        \/        \/

usage: zimbra.py [-h] -u URL -d DTD -n PAYLOAD_NAME -f PAYLOAD_FILE

Zimbra RCE CVE-2019-9670

optional arguments:
  -h, --help            show this help message and exit
  -u URL, --url URL     Target url
  -d DTD, --dtd DTD     Url to DTD
  -n PAYLOAD_NAME, --name PAYLOAD_NAME
                        Name of uploaded payload
  -f PAYLOAD_FILE, --file PAYLOAD_FILE
                        File containing payload
```
File Snapshot

[4.0K] /data/pocs/9af61a2075d622f041acce06d575312100734788 ├── [1.0K] LICENSE ├── [ 927] README.md └── [8.1K] zimbra.py 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →