ZoneMinder is a free, open source Closed-circuit television software application. Affected versions of zoneminder are subject to a vulnerability which allows users with "View" system permissions to inject new data into the logs stored by Zoneminder. This was observed through an HTTP POST request containing log information to the "/zm/index.php" endpoint. Submission is not rate controlled and could affect database performance and/or consume all storage resources. Users are advised to upgrade. There are no known workarounds for this issue.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/171498/Zoneminder-Log-Injection-XSS-Cross-Site-Request-Forgery.html | |
https://github.com/ZoneMinder/zoneminder/commit/34ffd92bf123070cab6c83ad4cfe6297dd0ed0b4 | Patch Third Party Advisory |
https://github.com/ZoneMinder/zoneminder/commit/73d9f2482cdcb238506388798d3cf92546f9e40c | Patch Third Party Advisory |
https://github.com/ZoneMinder/zoneminder/commit/cb3fc5907da21a5111ae54128a5d0b49ae755e9b | Patch Third Party Advisory |
https://github.com/ZoneMinder/zoneminder/commit/de2866f9574a2bf2690276fad53c91d607825408 | Patch Third Party Advisory |
https://github.com/ZoneMinder/zoneminder/security/advisories/GHSA-cfcx-v52x-jh74 | Exploit Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2022-10-07T00:00:00
Updated: 2023-03-27T00:00:00
Reserved: 2022-09-02T00:00:00
Link: CVE-2022-39291
JSON object: View
NVD Information
Status : Modified
Published: 2022-10-07T21:15:11.770
Modified: 2023-03-27T18:15:11.797
Link: CVE-2022-39291
JSON object: View
Redhat Information
No data.
CWE