Directory Traversal Affecting zoneminder package, versions <1.36.13+dfsg1-1
Threat Intelligence
EPSS
35.43% (98th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN12-ZONEMINDER-2803487
- published 26 Apr 2022
- disclosed 26 Apr 2022
Introduced: 26 Apr 2022
CVE-2022-29806 Open this link in a new tabHow to fix?
Upgrade Debian:12
zoneminder
to version 1.36.13+dfsg1-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream zoneminder
package and not the zoneminder
package as distributed by Debian
.
See How to fix?
for Debian:12
relevant fixed versions and status.
ZoneMinder before 1.36.13 allows remote code execution via an invalid language. Ability to create a debug log file at an arbitrary pathname contributes to exploitability.
References
- https://security-tracker.debian.org/tracker/CVE-2022-29806
- http://packetstormsecurity.com/files/166980/ZoneMinder-Language-Settings-Remote-Code-Execution.html
- https://forums.zoneminder.com/viewtopic.php?t=31638
- https://github.com/ZoneMinder/zoneminder/commit/9fee64b62fbdff5bf5ece1d617f1f53c7b1967cb
- https://github.com/ZoneMinder/zoneminder/releases/tag/1.36.13
- https://krastanoel.com/cve/2022-29806
CVSS Scores
version 3.1