Share
## https://sploitus.com/exploit?id=549DF2E5-96E4-5204-9F2F-303AABC189EE
# CVE-2022-27925 (Zimbra RCE 2022)

This repo is part of the ***hgrab-framework***

### dork
`title: "<title>Zimbra Web Client Sign In</title>"`

### Affected product
  - Zimbra Collaboration Suite Network Edition 9.0.0 Patch 23 (and earlier)
  - Zimbra Collaboration Suite Network Edition 8.8.15 Patch 30 (and earlier)

### Installation
Install the app on the server
```sh
user@domain:~# git clone https://github.com/Inplex-sys/CVE-2022-27925.git
user@domain:~# cd ./CVE-2022-27925/
user@domain:~# python3 main.py <list.txt> <output> <command>
```

The list file must contain the targets servers with this format `<http-https>://<target>:<port>`

![image](https://user-images.githubusercontent.com/69421356/193409368-c3b2139c-ec37-4261-9536-e43ea8102146.png)