Patch

CVE-2024-45519

with vRx

Vulnerability Overview
CVE Name
CVE-2024-45519
Severity
10
Critical
CVE Description
The postjournal service in Zimbra Collaboration (ZCS) before 8.8.15 Patch 46, 9 before 9.0.0 Patch 41, 10 before 10.0.9, and 10.1 before 10.1.1 sometimes allows unauthenticated users to execute commands.
The postjournal service in Zimbra Collaboration (ZCS) before 8.8.15 Patch 46, 9 before 9.0.0 Patch 41, 10 before 10.0.9, and 10.1 before 10.1.1 sometimes allows unauthenticated users to execute commands.
Show more
Show less
Latest Patch info
There is no patch available at the moment, but you can use our script.
Patch Name
https://wiki.zimbra.com/wiki/Security_Center
Date
26.08.2019
Script
Script Type
Remediation script
Introduction CVE-2024-45519 is a major security issue in Zimbra's postjournal service, which is part of the Zimbra Collaboration Suite. This vulnerability enables attackers to execute malicious instructions on your server without logging in, allowing them to seize control of the system. The vulnerability is being actively abused, so take action if you use Zimbra. This article will show you how to use a simple Python script to remotely connect to your Zimbra server and stop the vulnerable postjournal service, lowering the chance of an attack. How The Script Works The Python script employs Paramiko, a module that enables Python to connect to servers over SSH. Once connected, the script executes a command on the server to deactivate the postjournal service, which is where the vulnerability lies, before restarting Zimbra to implement the modifications. SSH Connection: The script prompts you for the server's IP address, SSH port (default: 22), and login information. It then utilizes this information to create a secure connection with the Zimbra server. Disabling the Service: It runs the following command: zmlocalconfig -e postjournal_enabled=false && zmcontrol restart This disables the vulnerable postjournal service and restarts Zimbra to apply the changes. How to Use the Script Install Python and Paramiko: First, you need to have Python 3 installed on your system. You also need the Paramiko library, which allows you to connect to your server via SSH. Install it by running: pip install paramiko Run the script: Save the script as remedy.py, then open a terminal and run it: python3 remedy.py Enter Your Server Details: The script will ask you for: Zimbra server IP/hostname: Enter the IP address or hostname of your server. SSH Port: The default is 22, but if your SSH runs on a different port, enter that. Username and Password: These are the credentials you use to log in to your server via SSH. Service Disabled: Once the script runs successfully, the postjournal service will be disabled, and Zimbra will restart to apply the changes. Final Thoughts It is simple and effective to lessen the risk that CVE-2024-45519 poses by disabling the postjournal service. While this script helps protect your Zimbra installation, you should also ensure your systems are regularly updated with the latest patches to stay secure. References Tenable's CVE-2024-45519 Overview The Hacker News Report on Active Exploitation Zimbra Security Advisories
Introduction CVE-2024-45519 is a major security issue in Zimbra's postjournal service, which is part of the Zimbra Collaboration Suite. This vulnerability enables attackers to execute malicious instructions on your server without logging in, allowing them to seize control of the system. The vulnerability is being actively abused, so take action if you use Zimbra. This article will show you how to use a simple Python script to remotely connect to your Zimbra server and stop the vulnerable postjournal service, lowering the chance of an attack. How The Script Works The Python script employs Paramiko, a module that enables Python to connect to servers over SSH. Once connected, the script executes a command on the server to deactivate the postjournal service, which is where the vulnerability lies, before restarting Zimbra to implement the modifications. SSH Connection: The script prompts you for the server's IP address, SSH port (default: 22), and login information. It then utilizes this information to create a secure connection with the Zimbra server. Disabling the Service: It runs the following command: zmlocalconfig -e postjournal_enabled=false && zmcontrol restart This disables the vulnerable postjournal service and restarts Zimbra to apply the changes. How to Use the Script Install Python and Paramiko: First, you need to have Python 3 installed on your system. You also need the Paramiko library, which allows you to connect to your server via SSH. Install it by running: pip install paramiko Run the script: Save the script as remedy.py, then open a terminal and run it: python3 remedy.py Enter Your Server Details: The script will ask you for: Zimbra server IP/hostname: Enter the IP address or hostname of your server. SSH Port: The default is 22, but if your SSH runs on a different port, enter that. Username and Password: These are the credentials you use to log in to your server via SSH. Service Disabled: Once the script runs successfully, the postjournal service will be disabled, and Zimbra will restart to apply the changes. Final Thoughts It is simple and effective to lessen the risk that CVE-2024-45519 poses by disabling the postjournal service. While this script helps protect your Zimbra installation, you should also ensure your systems are regularly updated with the latest patches to stay secure. References Tenable's CVE-2024-45519 Overview The Hacker News Report on Active Exploitation Zimbra Security Advisories
Affected OS & Apps
Collaboration
by
Zimbra
Show more
4.8

Patch faster and smarter
with vRx

Book a Demo
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

More than 600 customers trust vRx:

Solution

Remediate faster with vRx

Patch Management

vRx automatically deploys patches across all systems, cutting patching time by 80%.

Scripting Engine

vRx’s scripting engine solves complex vulnerabilities, like log4j, with built-in or custom scripts.

Patchless Protection

vRx’s Patchless Protection secures vulnerable apps and reduces risk while maintaining functionality.
Shortlist 2024 by Captera
4.9
Customer first by Gartner
4.8
Leader spring by G2
4.9

Hear from our Customers

Valuable resources saved

"Before vRx, we would spend countless hours manually finding and verifying patches. We saved so much time (and headache!)."
Anonymous IT Operations LeadAnonymous IT Operations Lead
Anonymous IT Operations Lead
IT Operations Lead

Third-party software patching is the most valuable feature.

"We have automated third-party patching on specific software, improving efficiency by 80%. vRx has reduced our patching time, which has improved our operations. It is more robust than other solutions because it offers better third-party remediation."
Billy TurnerBilly Turner
Billy Turner
VP, Managed Technology & Services

Single source of truth, capable of handling any application in our fleet

"vRx gives a single pane of glass to see what patches needed to go out and what sort of vulnerabilities we have on our Windows machines. Our meantime to remediate vulnerabilities has gone down by about 60% to 70%."
Peter FallowfieldPeter Fallowfield
Peter Fallowfield
IT Manager

60% faster remediation, many hours saved

"Typically, with our previous solution of ManageEngine, it took about three hours to patch Windows Server, and now, that is less than an hour. It means less downtime for the business each month when we do patches."
Anonymous Security AnalystAnonymous Security Analyst
Anonymous Security Analyst
Security Analyst

Great patching capabilities, helpful dashboard, and excellent support

"vRx has saved us an incredible amount of time. We can just rely on the automated system and the schedules we've set. It's a huge time saver. It's saved us hundreds of hours."
Michael CortezMichael Cortez
Michael Cortez
Sr. Director of IT

My favorite feature is Patchless Protection

"With Vicarius' vRx, I've never seen a patch that failed or had to be rolled back. We're saving quite a bit of time. Our clients using vRx haven't had any issues, and they've easily established patching for all their endpoints. "
Jeremy HermanJeremy Herman
Jeremy Herman
Security Engineer

Unified vulnerability discovery, prioritization, and remediation

"Vicarius streamlines vulnerability management between IT & Security by directly linking identified vulnerabilities to required patches, enhancing efficiency. The automation process has saved at least 30 percent of our manual tasks."
Wayne AjimineWayne Ajimine
Wayne Ajimine
Information Security Professional

Patchless Protection is an incredible technology!

"vRx reduces the time customers spend on patching by reducing the overhead on the administrators, allowing them to do additional work. It saves time they would spend addressing the patching process, follow-ups, etc."
Antwune GrayAntwune Gray
Antwune Gray
VP IT Security and Services

Merge Security & IT to Remediate Threats

“Vicarius’s vRx enabled Adama to centralize and consolidate work between IT and security teams, leading to a more efficient patching workflow."
Oshri CohenOshri Cohen
Oshri Cohen
CISO
Tanya Alfonso
4.8

Automated Patching, Scripting, and more

Talk with our team to get a personal walkthrough
Book a Demo
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.