ZoneMinder is a free, open source Closed-circuit television software application. In affected versions authenticated users can bypass CSRF keys by modifying the request supplied to the Zoneminder web application. These modifications include replacing HTTP POST with an HTTP GET and removing the CSRF key from the request. An attacker can take advantage of this by using an HTTP GET request to perform actions with no CSRF protection. This could allow an attacker to cause an authenticated user to perform unexpected actions on the web application. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/171498/Zoneminder-Log-Injection-XSS-Cross-Site-Request-Forgery.html | |
https://github.com/ZoneMinder/zoneminder/commit/c0a4c05e84eea0f6ccf7169c014efe5422c9ba0d | Patch Third Party Advisory |
https://github.com/ZoneMinder/zoneminder/security/advisories/GHSA-xgv6-qv6c-399q | Exploit Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2022-10-07T00:00:00
Updated: 2023-03-27T00:00:00
Reserved: 2022-09-02T00:00:00
Link: CVE-2022-39290
JSON object: View
NVD Information
Status : Modified
Published: 2022-10-07T21:15:11.673
Modified: 2023-03-27T18:15:11.687
Link: CVE-2022-39290
JSON object: View
Redhat Information
No data.
CWE