CVE-2022-39285

Name
CVE-2022-39285
Description
ZoneMinder is a free, open source Closed-circuit television software application The file parameter is vulnerable to a cross site scripting vulnerability (XSS) by backing out of the current "tr" "td" brackets. This then allows a malicious user to provide code that will execute when a user views the specific log on the "view=log" page. This vulnerability allows an attacker to store code within the logs that will be executed when loaded by a legitimate user. These actions will be performed with the permission of the victim. This could lead to data loss and/or further exploitation including account takeover. This issue has been addressed in versions `1.36.27` and `1.37.24`. Users are advised to upgrade. Users unable to upgrade should disable database logging.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://github.com/ZoneMinder/zoneminder/commit/c0a4c05e84eea0f6ccf7169c014efe5422c9ba0d
MISC https://github.com/ZoneMinder/zoneminder/commit/d289eb48601a76e34feea3c1683955337b1fae59
CONFIRM https://github.com/ZoneMinder/zoneminder/security/advisories/GHSA-h6xp-cvwv-q433
MISC http://packetstormsecurity.com/files/171498/Zoneminder-Log-Injection-XSS-Cross-Site-Request-Forgery.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:* zoneminder >= None < 1.36.27
cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:* zoneminder > 1.37.0 < 1.37.24

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
zoneminder 3.16-community 1.36.14-r2 Kaarle Ritvanen <kunkku@alpinelinux.org> possibly vulnerable