By "patch 35" I assume you're referring to v9.0.0. I've just updated certs on 2 test v9-ne systems with P35 applied and not had an issue. When you say "breaks zmcertmgr" can you be a bit more specific?
Zimbra Security Update
Re: Zimbra Security Update
- barrydegraaff
- Zimbra Employee
- Posts: 237
- Joined: Tue Jun 17, 2014 3:31 am
- Contact:
Re: Zimbra Security Update
As far as we know it was not exploited in the wild.
--
Barry de Graaff
Email: barry.degraaff [at] synacor [dot] com
Admin of Zimbra-Community Github: https://github.com/orgs/Zimbra-Community/ and the
Zimlet Gallery https://gallery.zetalliance.org/extend/
Barry de Graaff
Email: barry.degraaff [at] synacor [dot] com
Admin of Zimbra-Community Github: https://github.com/orgs/Zimbra-Community/ and the
Zimlet Gallery https://gallery.zetalliance.org/extend/
-
- Posts: 1
- Joined: Tue Aug 29, 2023 3:38 pm
Re: Zimbra Security Update
I'm only seeing 8.8.15.p40 on zm-build and I need to install a source build to patch my server. Does anyone know if p41 and p42 are included in the 8.8.15.p40 tag for the FOSS version?
Re: Zimbra Security Update
An official violation check with evidence to bring (logs? files?) is being required from many customers.
INB4, "vulnerability has not been exploited because is not public" is not the answer.
-
- Advanced member
- Posts: 151
- Joined: Sat Sep 13, 2014 12:54 am
- Location: Netherlands
- ZCS/ZD Version: Ubuntu 18.04, 8.8.15_P43
- Contact:
Re: Zimbra Security Update
I could place a 'grep' command on the proper logs here and ask everybody to run it, so we can check whether this is tried in the wild, but then I suppose my post will be deleted again...
Consider seriously: because of the history of exploits: block Zimbra web interface with VPN, firewall or HTTP proxy.
Re: Zimbra Security Update
I think that would be an excellent idea. When was your post deleted? I don't remember seeing it.
-
- Advanced member
- Posts: 151
- Joined: Sat Sep 13, 2014 12:54 am
- Location: Netherlands
- ZCS/ZD Version: Ubuntu 18.04, 8.8.15_P43
- Contact:
Re: Zimbra Security Update
Friday, august 25th. I commented on it here: viewtopic.php?p=310673#p310673
Hackers by now surely will have examined the patches, so I really think deleting the post would be counter-productive, so here goes:
I call upon all Zimbra admins to run this and report hits.
Disclaimer: I did not try calling the actual exploitable files, just dummies I put in place for this test, so see in which log the request show up.
Hackers by now surely will have examined the patches, so I really think deleting the post would be counter-productive, so here goes:
Code: Select all
grep --fixed-strings --ignore-case hostedlogin /opt/zimbra/log/access_log*
Disclaimer: I did not try calling the actual exploitable files, just dummies I put in place for this test, so see in which log the request show up.
Consider seriously: because of the history of exploits: block Zimbra web interface with VPN, firewall or HTTP proxy.
Re: Zimbra Security Update
Thanks for reposting your 'srcipt', I ran it and it produced no results. 

-
- Outstanding Member
- Posts: 227
- Joined: Thu May 12, 2016 1:56 pm
- Location: Belgium
- ZCS/ZD Version: upgrading from 8.8.15 to 9.0
Re: Zimbra Security Update
We've been watching the logs as well for this string and saw no occurances so far (apart from our own tests).
Re: Zimbra Security Update
Ok, if talking about it is somewhat permitted I would like to share this detail:
When we received the "delete these 3 files" workaround, we first checked if these file existed.
We found them existing on every production environment, but NOT on the test environments: on the test envs only the first existed (it's on the base package).
We tried to call the first of the files, the only one reachable under public, and we found that the request generates the other two files, the ones under jetty/work.
This explicit request leaves a trace on the nginx.access.log, easily greppable with
But on the production environments, all the three files have been found, and no evidence on the logs of that request.
We store over a year of logs, and checked all of them.
Are we looking in the wrong place? Can someone point us in the right direction?
When we received the "delete these 3 files" workaround, we first checked if these file existed.
We found them existing on every production environment, but NOT on the test environments: on the test envs only the first existed (it's on the base package).
We tried to call the first of the files, the only one reachable under public, and we found that the request generates the other two files, the ones under jetty/work.
This explicit request leaves a trace on the nginx.access.log, easily greppable with
So we supposed that the existence of the second and third files is subordinate to a request of the first one.halfgaar wrote: ↑Wed Aug 30, 2023 9:30 pmCode: Select all
grep --fixed-strings --ignore-case hostedlogin /opt/zimbra/log/access_log*
But on the production environments, all the three files have been found, and no evidence on the logs of that request.
We store over a year of logs, and checked all of them.
Are we looking in the wrong place? Can someone point us in the right direction?