Cross-site Scripting (XSS) Affecting zoneminder package, versions <1.36.31+dfsg1-1


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

Exploit Maturity
Mature
EPSS
0.09% (38th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Scripting (XSS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIANUNSTABLE-ZONEMINDER-3042165
  • published11 Oct 2022
  • disclosed7 Oct 2022

Introduced: 7 Oct 2022

CVE-2022-39285  (opens in a new tab)
CWE-79  (opens in a new tab)

How to fix?

Upgrade Debian:unstable zoneminder to version 1.36.31+dfsg1-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream zoneminder package and not the zoneminder package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

ZoneMinder is a free, open source Closed-circuit television software application The file parameter is vulnerable to a cross site scripting vulnerability (XSS) by backing out of the current "tr" "td" brackets. This then allows a malicious user to provide code that will execute when a user views the specific log on the "view=log" page. This vulnerability allows an attacker to store code within the logs that will be executed when loaded by a legitimate user. These actions will be performed with the permission of the victim. This could lead to data loss and/or further exploitation including account takeover. This issue has been addressed in versions 1.36.27 and 1.37.24. Users are advised to upgrade. Users unable to upgrade should disable database logging.

CVSS Scores

version 3.1