CVE-2022-39291

Name
CVE-2022-39291
Description
ZoneMinder is a free, open source Closed-circuit television software application. Affected versions of zoneminder are subject to a vulnerability which allows users with "View" system permissions to inject new data into the logs stored by Zoneminder. This was observed through an HTTP POST request containing log information to the "/zm/index.php" endpoint. Submission is not rate controlled and could affect database performance and/or consume all storage resources. Users are advised to upgrade. There are no known workarounds for this issue.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://github.com/ZoneMinder/zoneminder/commit/34ffd92bf123070cab6c83ad4cfe6297dd0ed0b4
MISC https://github.com/ZoneMinder/zoneminder/commit/cb3fc5907da21a5111ae54128a5d0b49ae755e9b
MISC https://github.com/ZoneMinder/zoneminder/commit/de2866f9574a2bf2690276fad53c91d607825408
CONFIRM https://github.com/ZoneMinder/zoneminder/security/advisories/GHSA-cfcx-v52x-jh74
MISC https://github.com/ZoneMinder/zoneminder/commit/73d9f2482cdcb238506388798d3cf92546f9e40c
MISC http://packetstormsecurity.com/files/171498/Zoneminder-Log-Injection-XSS-Cross-Site-Request-Forgery.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:* zoneminder >= None < 1.36.27
cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:* zoneminder > 1.37.0 < 1.37.24

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
zoneminder 3.16-community 1.36.14-r2 Kaarle Ritvanen <kunkku@alpinelinux.org> possibly vulnerable