Add a CVE and better description

This commit is contained in:
Ron Bowes 2022-08-02 12:57:28 -07:00 committed by bwatters
parent ea581482d4
commit caff6a53f5
1 changed files with 7 additions and 5 deletions

View File

@ -21,10 +21,12 @@ class MetasploitModule < Msf::Exploit::Local
info,
'Name' => 'Zimbra zmslapd arbitrary module load',
'Description' => %q{
This module exploits a vulnerability in Zimbra's sudo configuration,
which permits the zimbra user to execute zmslapd with arbitrary
parameters. That service can load an arbitrary .so file, which allows
us to run code as root.
This module exploits CVE-2022-37393, which is a vulnerability in
Zimbra's sudo configuration that permits the zimbra user to execute
the zmslapd binary as root with arbitrary parameters. As part of its
intended functionality, zmslapd can load a user-defined configuration
file, which includes plugins in the form of .so files, which also
execute as root.
},
'License' => MSF_LICENSE,
'Author' => [
@ -37,7 +39,7 @@ class MetasploitModule < Msf::Exploit::Local
'SessionTypes' => [ 'shell', 'meterpreter' ],
'Privileged' => true,
'References' => [
# Currently there is no CVE, but I reported it and requested one
[ 'CVE', '2022-37393',
[ 'URL', 'https://darrenmartyn.ie/2021/10/27/zimbra-zmslapd-local-root-exploit/' ],
],
'Targets' => [