Critical Zimbra Flaw Being Mass Exploited
Hackers are mass exploiting a critical command injection vulnerability to gain access to vulnerable Zimbra email servers. Successful exploitation of the flaw allows malicious code to be remotely executed on the Zimbra email server. Threat actors have been exploiting the flaw to drop and execute a webshell on the Zimbra server. Once installed, the webshell provides full access to the Zimbra server, allows the downloading and execution of additional files, and provides the required access for a more extensive network compromise.
The vulnerability is tracked as CVE-2024-45519 (CVSS base score: 9.8) and affects Zimbra’s postjournal service, which parses inbound emails over SMTP. The vulnerability can be exploited by sending a specially crafted email with malicious code in the CC field. A vulnerable Zimbra server will execute the code in the CC field when the postjournal service processes the email. Exploitation of the flaw was first detected by HarfangLab researcher Ivan Kwiatkowski and has also been confirmed by Proofpoint. Proofpoint confirmed it detected exploitation of the flaw in the wild on September 28, 2024, the day after proof-of-concept exploit code was released by Project Discovery.
A campaign has been detected that spoofs Gmail and has base-64 encoded strings of code in the CC field, which are executed by postjournal on the Zimbra server. According to Proofpoint, when installed, the webshell listens for an inbound connection with a pre-determined JSESSIONID cookie field. If present, it will parse the JACTION cookie for Base64 commands.
Zimbra has patched the vulnerability in version 9.0.0 Patch 41 and later versions, versions 10.0.9 and 10.1.1, and Zimbra 8.8.15 Patch 46 and later versions. In addition to ensuring you are running a patched version, the Project Discovery researchers also recommend disabling postjournal if it is not needed and ensuring mynetworks is properly configured to prevent unauthorized access. Even if postjournal is not enabled on the Zimbra server, the patch should be applied.
Get The FREE
HIPAA Compliance Checklist
Immediate Delivery of Checklist Link To Your Email Address
Please Enter Correct Email Address
Your Privacy Respected
HIPAA Journal Privacy Policy
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently added the flaw to its Known Exploited Vulnerability (KEV) Catalog. Since the flaw is being mass exploited, immediate patching is essential to prevent exploitation.


