Add a CVE and better description
This commit is contained in:
parent
ea581482d4
commit
caff6a53f5
|
@ -21,10 +21,12 @@ class MetasploitModule < Msf::Exploit::Local
|
|||
info,
|
||||
'Name' => 'Zimbra zmslapd arbitrary module load',
|
||||
'Description' => %q{
|
||||
This module exploits a vulnerability in Zimbra's sudo configuration,
|
||||
which permits the zimbra user to execute zmslapd with arbitrary
|
||||
parameters. That service can load an arbitrary .so file, which allows
|
||||
us to run code as root.
|
||||
This module exploits CVE-2022-37393, which is a vulnerability in
|
||||
Zimbra's sudo configuration that permits the zimbra user to execute
|
||||
the zmslapd binary as root with arbitrary parameters. As part of its
|
||||
intended functionality, zmslapd can load a user-defined configuration
|
||||
file, which includes plugins in the form of .so files, which also
|
||||
execute as root.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' => [
|
||||
|
@ -37,7 +39,7 @@ class MetasploitModule < Msf::Exploit::Local
|
|||
'SessionTypes' => [ 'shell', 'meterpreter' ],
|
||||
'Privileged' => true,
|
||||
'References' => [
|
||||
# Currently there is no CVE, but I reported it and requested one
|
||||
[ 'CVE', '2022-37393',
|
||||
[ 'URL', 'https://darrenmartyn.ie/2021/10/27/zimbra-zmslapd-local-root-exploit/' ],
|
||||
],
|
||||
'Targets' => [
|
||||
|
|
Loading…
Reference in New Issue