// For flags

CVE-2022-39291

Denial of service through logs in zoneminder

Severity Score

5.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

ZoneMinder is a free, open source Closed-circuit television software application. Affected versions of zoneminder are subject to a vulnerability which allows users with "View" system permissions to inject new data into the logs stored by Zoneminder. This was observed through an HTTP POST request containing log information to the "/zm/index.php" endpoint. Submission is not rate controlled and could affect database performance and/or consume all storage resources. Users are advised to upgrade. There are no known workarounds for this issue.

ZoneMinder es una aplicación de software de circuito cerrado de televisión gratuita y de código abierto. Las versiones afectadas de zoneminder están sujetas a una vulnerabilidad que permite a usuarios con permisos de sistema "Visualizar", inyectar nuevos datos en los registros almacenados por Zoneminder. Esto ha sido observado mediante una petición HTTP POST que contiene información de registro al endpoint "/zm/index.php". El envío no está controlado y podría afectar al rendimiento de la base de datos y/o consumir todos los recursos de almacenamiento. Es recomendado a usuarios actualizar. No se presentan mitigaciones conocidas para este problema

Zoneminder versions prior to 1.37.24 suffers from log injection, persistent cross site scripting, and cross site request forgery bypass vulnerabilities.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
Low
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-09-02 CVE Reserved
  • 2022-10-07 CVE Published
  • 2023-03-27 First Exploit
  • 2024-04-29 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Zoneminder
Search vendor "Zoneminder"
Zoneminder
Search vendor "Zoneminder" for product "Zoneminder"
< 1.36.27
Search vendor "Zoneminder" for product "Zoneminder" and version " < 1.36.27"
-
Affected
Zoneminder
Search vendor "Zoneminder"
Zoneminder
Search vendor "Zoneminder" for product "Zoneminder"
> 1.37.0 < 1.37.24
Search vendor "Zoneminder" for product "Zoneminder" and version " > 1.37.0 < 1.37.24"
-
Affected