Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2022-41347
PUBLISHED
More InfoOfficial Page
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
View Known Exploited Vulnerability (KEV) details
Published At-26 Sep, 2022 | 01:29
Updated At-21 May, 2025 | 18:49
Rejected At-
▼CVE Numbering Authority (CNA)

An issue was discovered in Zimbra Collaboration (ZCS) 8.8.x and 9.x (e.g., 8.8.15). The Sudo configuration permits the zimbra user to execute the NGINX binary as root with arbitrary parameters. As part of its intended functionality, NGINX can load a user-defined configuration file, which includes plugins in the form of .so files, which also execute as root.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories
x_refsource_MISC
https://wiki.zimbra.com/wiki/Security_Center
x_refsource_MISC
https://darrenmartyn.ie/2021/10/25/zimbra-nginx-local-root-exploit/
x_refsource_MISC
https://github.com/darrenmartyn/zimbra-hinginx
x_refsource_MISC
Hyperlink: https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories
Resource:
x_refsource_MISC
Hyperlink: https://wiki.zimbra.com/wiki/Security_Center
Resource:
x_refsource_MISC
Hyperlink: https://darrenmartyn.ie/2021/10/25/zimbra-nginx-local-root-exploit/
Resource:
x_refsource_MISC
Hyperlink: https://github.com/darrenmartyn/zimbra-hinginx
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories
x_refsource_MISC
x_transferred
https://wiki.zimbra.com/wiki/Security_Center
x_refsource_MISC
x_transferred
https://darrenmartyn.ie/2021/10/25/zimbra-nginx-local-root-exploit/
x_refsource_MISC
x_transferred
https://github.com/darrenmartyn/zimbra-hinginx
x_refsource_MISC
x_transferred
Hyperlink: https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://wiki.zimbra.com/wiki/Security_Center
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://darrenmartyn.ie/2021/10/25/zimbra-nginx-local-root-exploit/
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://github.com/darrenmartyn/zimbra-hinginx
Resource:
x_refsource_MISC
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-noinfoCWE-noinfo Not enough information
Type: CWE
CWE ID: CWE-noinfo
Description: CWE-noinfo Not enough information
Metrics
VersionBase scoreBase severityVector
3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found