Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-39285
HistoryOct 07, 2022 - 12:00 a.m.

CVE-2022-39285

2022-10-0700:00:00
ubuntu.com
ubuntu.com
15
zoneminder
cross site scripting
code execution
logs
data loss
account takeover
cve-2022-39285
zoneminder version 1.36.27
zoneminder version 1.37.24
debian security team

7.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:H

0.001 Low

EPSS

Percentile

36.4%

ZoneMinder is a free, open source Closed-circuit television software
application The file parameter is vulnerable to a cross site scripting
vulnerability (XSS) by backing out of the current “tr” “td” brackets. This
then allows a malicious user to provide code that will execute when a user
views the specific log on the “view=log” page. This vulnerability allows an
attacker to store code within the logs that will be executed when loaded by
a legitimate user. These actions will be performed with the permission of
the victim. This could lead to data loss and/or further exploitation
including account takeover. This issue has been addressed in versions
1.36.27 and 1.37.24. Users are advised to upgrade. Users unable to
upgrade should disable database logging.

Notes

Author Note
rodrigo-zaiden Debian security team has a note limiting security support for ZoneMinder for installations behind a trusted HTTP zone, more information can be found at debian/README.Debian.security

7.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:H

0.001 Low

EPSS

Percentile

36.4%