CVE-2022-39285

CVSS V2 None CVSS V3 Medium 5.4
Description
ZoneMinder is a free, open source Closed-circuit television software application The file parameter is vulnerable to a cross site scripting vulnerability (XSS) by backing out of the current "tr" "td" brackets. This then allows a malicious user to provide code that will execute when a user views the specific log on the "view=log" page. This vulnerability allows an attacker to store code within the logs that will be executed when loaded by a legitimate user. These actions will be performed with the permission of the victim. This could lead to data loss and/or further exploitation including account takeover. This issue has been addressed in versions `1.36.27` and `1.37.24`. Users are advised to upgrade. Users unable to upgrade should disable database logging.
Overview
  • CVE ID
  • CVE-2022-39285
  • Assigner
  • security-advisories@github.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2022-10-07T21:15:11
  • Last Modified Date
  • 2023-03-27T18:15:11
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:* 1 OR 1.36.27
cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:* 1 OR 1.37.24
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • LOW
  • User Interaction
  • REQUIRED
  • Scope
  • CHANGED
  • Confidentiality Impact
  • LOW
  • Availability Impact
  • NONE
  • Base Score
  • 5.4
  • Base Severity
  • MEDIUM
  • Exploitability Score
  • 2.3
  • Impact Score
  • 2.7
History
Created Old Value New Value Data Type Notes
2022-10-07 22:00:11 Added to TrackCVE
2022-12-07 05:53:13 2022-10-07T21:15Z 2022-10-07T21:15:11 CVE Published Date updated
2022-12-07 05:53:13 2022-10-11T13:24:56 CVE Modified Date updated
2022-12-07 05:53:13 Analyzed Vulnerability Status updated
2023-03-27 18:16:47 2023-03-27T18:15:11 CVE Modified Date updated
2023-03-27 18:16:47 Analyzed Modified Vulnerability Status updated
2023-03-27 18:16:49 References updated