Language:
https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P31
https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P24
Severity: Critical
ID: 163072
File Name: zimbra_9_0_0_p24.nasl
Version: 1.11
Type: combined
Agent: unix
Family: CGI abuses
Published: 7/13/2022
Updated: 4/25/2023
Supported Sensors: Nessus Agent, Nessus
Risk Factor: High
Score: 8.4
Risk Factor: High
Base Score: 7.5
Temporal Score: 6.2
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2021-39275
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 9.1
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CPE: cpe:/a:zimbra:collaboration_suite
Required KB Items: installed_sw/zimbra_zcs
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 3/20/2022
Vulnerability Publication Date: 4/20/2022
CISA Known Exploited Vulnerability Due Dates: 12/15/2021, 8/25/2022, 9/1/2022, 4/24/2023
Metasploit (Zip Path Traversal in Zimbra (mboximport) (CVE-2022-27925))
CVE: CVE-2021-21702, CVE-2021-39275, CVE-2021-40438, CVE-2022-27924, CVE-2022-27925, CVE-2022-27926
IAVA: 2022-A-0268-S