Cross-site Scripting (XSS) Affecting zoneminder package, versions <1.36.7-r0
Snyk CVSS
Attack Complexity
Low
User Interaction
Required
Scope
Changed
Threat Intelligence
EPSS
0.08% (32nd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ALPINE317-ZONEMINDER-3144859
- published 25 Nov 2021
- disclosed 4 Feb 2019
How to fix?
Upgrade Alpine:3.17
zoneminder
to version 1.36.7-r0 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream zoneminder
package and not the zoneminder
package as distributed by Alpine
.
See How to fix?
for Alpine:3.17
relevant fixed versions and status.
Reflected XSS exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code in the view 'filter' as it insecurely prints the 'filter[Name]' (aka Filter name) value on the web page without applying any proper filtration.