"New UnRAR Vulnerability Could Lead to Zimbra Webmail Hack"

Security researchers at Sonar have discovered a new flaw in RARlab’s UnRAR utility that could be exploited to steal emails from individual Zimbra mail user accounts.  The path traversal vulnerability, found in the Unix versions of UnRAR, has been assigned CVE-2022-30333 and a base score of 7.5 in the Common Vulnerability Scoring System (CVSS).  Zimbra is an enterprise email solution used by over 200,000 businesses, government, and financial institutions.  The researchers stated that the flaw would allow an attacker to create files outside the target extraction directory when an application or victim user extracts an untrusted archive.  The researchers noted that if an attacker can write to a known location, they are likely to be able to leverage it in a way leading to the execution of arbitrary commands on the system.  According to the researchers, successful exploitation would give attackers access to all emails sent and received on a compromised email server.  The researchers stated that the only requirement for this attack is that UnRAR was installed on the server, which researchers said would be likely as it is required for RAR archive virus scanning and spam-checking.  The researchers reportedly warned RarLab about the flaw on May 04, and the company released a patch on May 06 as part of version 6.12.  The vulnerability does not impact other versions of the software, including those for Windows and Android operating systems.

 

Infosecurity reports: "New UnRAR Vulnerability Could Lead to Zimbra Webmail Hack"

Submitted by Anonymous on