Vulnerability Details : CVE-2022-39291
ZoneMinder is a free, open source Closed-circuit television software application. Affected versions of zoneminder are subject to a vulnerability which allows users with "View" system permissions to inject new data into the logs stored by Zoneminder. This was observed through an HTTP POST request containing log information to the "/zm/index.php" endpoint. Submission is not rate controlled and could affect database performance and/or consume all storage resources. Users are advised to upgrade. There are no known workarounds for this issue.
Vulnerability category: Input validation
Products affected by CVE-2022-39291
- cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:*
- cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-39291
0.13%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 48 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-39291
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.4
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L |
2.8
|
2.5
|
NIST | |
5.4
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L |
2.8
|
2.5
|
GitHub, Inc. |
CWE ids for CVE-2022-39291
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: security-advisories@github.com (Primary)
References for CVE-2022-39291
-
http://packetstormsecurity.com/files/171498/Zoneminder-Log-Injection-XSS-Cross-Site-Request-Forgery.html
Zoneminder Log Injection / XSS / Cross Site Request Forgery ≈ Packet Storm
-
https://github.com/ZoneMinder/zoneminder/commit/de2866f9574a2bf2690276fad53c91d607825408
Check value of System:Edit permission and ZM_LOG_INJECT to disable aj… · ZoneMinder/zoneminder@de2866f · GitHubPatch;Third Party Advisory
-
https://github.com/ZoneMinder/zoneminder/commit/34ffd92bf123070cab6c83ad4cfe6297dd0ed0b4
Add permissions checking to API/Logs. Fixes unprivileged user being t… · ZoneMinder/zoneminder@34ffd92 · GitHubPatch;Third Party Advisory
-
https://github.com/ZoneMinder/zoneminder/commit/cb3fc5907da21a5111ae54128a5d0b49ae755e9b
Use canEdit['System'] and value of new ZM_LOG_INJECT to disable attem… · ZoneMinder/zoneminder@cb3fc59 · GitHubPatch;Third Party Advisory
-
https://github.com/ZoneMinder/zoneminder/security/advisories/GHSA-cfcx-v52x-jh74
Denial of Service through Logs in zoneminder · Advisory · ZoneMinder/zoneminder · GitHubExploit;Patch;Third Party Advisory
-
https://github.com/ZoneMinder/zoneminder/commit/73d9f2482cdcb238506388798d3cf92546f9e40c
Add ZM_LOG_INJECT config parameter to disable unprivileged log inject… · ZoneMinder/zoneminder@73d9f24 · GitHubPatch;Third Party Advisory
Jump to