CVE-2017-5367
Published: 6 February 2017
Multiple reflected XSS vulnerabilities exist within form and link input parameters of ZoneMinder v1.30 and v1.29, an open-source CCTV server web application, which allows a remote attacker to execute malicious scripts within an authenticated client's browser. The URL is /zm/index.php and sample parameters could include action=login&view=postlogin[XSS] view=console[XSS] view=groups[XSS] view=events&filter[terms][1][cnj]=and[XSS] view=events&filter%5Bterms%5D%5B1%5D%5Bcnj%5D=and[XSS] view=events&filter%5Bterms%5D%5B1%5D%5Bcnj%5D=[XSS]and view=events&limit=1%22%3E%3C/a%3E[XSS] (among others).
Priority
Status
Package | Release | Status |
---|---|---|
zoneminder Launchpad, Ubuntu, Debian |
artful |
Ignored
(end of life)
|
bionic |
Does not exist
|
|
cosmic |
Not vulnerable
(1.30.4+dfsg1-5)
|
|
disco |
Not vulnerable
(1.30.4+dfsg1-5)
|
|
eoan |
Not vulnerable
(1.30.4+dfsg1-5)
|
|
focal |
Not vulnerable
(1.30.4+dfsg1-5)
|
|
groovy |
Not vulnerable
(1.30.4+dfsg1-5)
|
|
hirsute |
Not vulnerable
(1.30.4+dfsg1-5)
|
|
impish |
Not vulnerable
(1.30.4+dfsg1-5)
|
|
jammy |
Not vulnerable
(1.30.4+dfsg1-5)
|
|
kinetic |
Not vulnerable
(1.30.4+dfsg1-5)
|
|
lunar |
Not vulnerable
(1.30.4+dfsg1-5)
|
|
mantic |
Not vulnerable
(1.30.4+dfsg1-5)
|
|
noble |
Not vulnerable
(1.30.4+dfsg1-5)
|
|
precise |
Ignored
(end of life)
|
|
trusty |
Does not exist
(trusty was needs-triage)
|
|
upstream |
Released
(1.30.4+dfsg-1)
|
|
xenial |
Needed
|
|
yakkety |
Ignored
(end of life)
|
|
zesty |
Ignored
(end of life)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.1 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Changed |
Confidentiality | Low |
Integrity impact | Low |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |