CVE-2024-33535

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to read arbitrary files from a specific directory in Zimbra Collaboration Suite. It affects Zimbra Collaboration (ZCS) versions 9.0 and 10.0 through local file inclusion in web application handling of the packages parameter. Attackers can exploit this without authentication to access sensitive information.

💻 Affected Systems

Products:
  • Zimbra Collaboration Suite (ZCS)
Versions: 9.0 and 10.0 (before security patches)
Operating Systems: All supported Zimbra OS platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects files within a specific directory, not arbitrary file system access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of sensitive configuration files, credentials, or system information leading to further attacks or data exfiltration.

🟠

Likely Case

Unauthorized reading of configuration files, logs, or other sensitive data within the vulnerable directory.

🟢

If Mitigated

Limited impact due to directory restrictions, but still potential information disclosure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Unauthenticated exploitation with simple parameter manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.0.8 and 9.0.0 Patch 40

Vendor Advisory: https://wiki.zimbra.com/wiki/Zimbra_Releases/10.0.8#Security_Fixes

Restart Required: Yes

Instructions:

1. Backup Zimbra installation and data. 2. Apply Zimbra patch 10.0.8 or 9.0.0 P40. 3. Restart Zimbra services. 4. Verify patch application.

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rules

all

Block malicious requests targeting the packages parameter

Network Segmentation

all

Restrict access to Zimbra web interface to trusted networks only

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure
  • Monitor logs for suspicious file inclusion attempts

🔍 How to Verify

Check if Vulnerable:

Check Zimbra version and compare with vulnerable versions (9.0 or 10.0 before patches)

Check Version:

zmcontrol -v

Verify Fix Applied:

Verify Zimbra version is 10.0.8 or 9.0.0 P40 or later

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to web endpoints with packages parameter
  • Failed file inclusion attempts in web logs

Network Indicators:

  • HTTP requests with suspicious packages parameter values
  • Unusual file path patterns in web requests

SIEM Query:

web_access_logs WHERE uri CONTAINS 'packages=' AND (uri CONTAINS '../' OR uri CONTAINS '..\\')

🔗 References

📤 Share & Export