Zimbra before 8.8.15 Patch 10 and 9.x before 9.0.0 Patch 3 allows remote code execution via an avatar file. There is potential abuse of /service/upload servlet in the webmail subsystem. A user can upload executable files (exe,sh,bat,jar) in the Contact section of the mailbox as an avatar image for a contact. A user will receive a "Corrupt File" error, but the file is still uploaded and stored locally in /opt/zimbra/data/tmp/upload/, leaving it open to possible remote execution.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T12:04:22.884Z

Reserved: 2020-05-14T00:00:00

Link: CVE-2020-12846

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-06-03T17:15:24.793

Modified: 2024-11-21T05:00:23.700

Link: CVE-2020-12846

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses