[ Hacking ] Mass CVE-2024-45519 🔥 Zimbra Postjournal Exploit 💚

  • 💌Important Message to All Fellas💌

    💌Important Message to All Fellas 💌

    ⚠️Thank you for being with us over the past year.
    To support our community, we're now offering an "Account Upgrade" for purchase.
    VIP and Legendary members get special direct downloads without needing to like or reply to threads. Upgrade now to enjoy these benefits!
    HERE Our Official Telegram

    ⛔ Spam: If someone try SCAM you or SPAM Message to you let me know we will ban them

    🏆 Download Error or Missing Link: Click on threads and report them to Our admin will re-upload for you.

    ☣️ Infected or Backdoor/RAT: If you find a virus, please report it to us via Telegram or click report in the threads, and we will completely ban them in 100%

    🎯 Our Plan : Make resource downloads on a private host without using another free upload because easy gone

    ❤️ We try our best to make everyone's shared tools clean and fresh in here, so enjoy with our fellas. ❤️

⚠️ CVE-2024-45519 is a critical remote code execution (RCE) vulnerability in Zimbra's Postjournal service. Attackers can exploit this flaw to execute arbitrary commands and gain control of affected systems.

zimbra_rce.png

🛠 Affected Versions:

Zimbra 8.8.15 (before Patch 46)
Zimbra 9 (before Patch 41)
Zimbra 10 (before 10.0.9)
Zimbra 10.1 (before 10.1.1)
🔥 Exploit Impact:
✅ Unauthenticated remote code execution
✅ Compromise of Zimbra email servers
✅ Potential data theft & service disruption

🖥️ Lab Setup
1️⃣ Prepare the Test Environment
🛠️ Use Ubuntu 20.04.6 LTS as the lab machine.

2️⃣ Download Zimbra
📥 Run the following commands:

sudo su
wget
Please, Log in or Register to view URLs content!

tar -xvzf zcs-NETWORK-8.8.15_GA_4177.UBUNTU20_64.20211112014220.tgz
cd zcs-NETWORK-8.8.15_GA_4177.UBUNTU20_64.20211112014220

3️⃣ Configure HOSTNAME
🔧 Set the hostname:

hostnamectl set-hostname zimbra.labo

4️⃣ Install Zimbra : Follow the installation guide here

Please, Log in or Register to view URLs content!

5️⃣ Replace Vulnerable POSTJournal Binary

💀 Replace the binary with a vulnerable version:

sudo pkill postjournal
dpkg-deb -x packages/zimbra-core_8.8.15.GA.4177.UBUNTU20.64_amd64.deb /tmp/zimbra-core
sudo cp /tmp/zimbra-core/opt/zimbra/libexec/postjournal /opt/zimbra/libexec/postjournal

6️⃣ Enable & Restart Zimbra Services

♻️ Active postjournal

sudo su - zimbra
zmlocalconfig -e postjournal_enabled=true
zmcontrol restart

⚠️ Important: This setup is for security research and patch testing only. Ensure responsible disclosure and update your Zimbra server immediately! 🚀🔒


drcrypter or drcrypter_ru

 

Forum statistics

Threads
1,833
Messages
35,548
Members
9,232
Latest member
lilxxxx
Member time online
747d 6h 16m
Reputation(s)
26