Vulnerability Description
ZoneMinder is a free, open source Closed-circuit television software application for Linux which supports IP, USB and Analog cameras. Versions prior to 1.36.33 and 1.37.33 are affected by a SQL Injection vulnerability. The (blind) SQL Injection vulnerability is present within the `filter[Query][terms][0][attr]` query string parameter of the `/zm/index.php` endpoint. A user with the View or Edit permissions of Events may execute arbitrary SQL. The resulting impact can include unauthorized data access (and modification), authentication and/or authorization bypass, and remote code execution.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zoneminder | Zoneminder | < 1.36.33 |
Related Weaknesses (CWE)
References
- https://github.com/ZoneMinder/zoneminder/security/advisories/GHSA-222j-wh8m-xjrxExploitVendor Advisory
- https://github.com/ZoneMinder/zoneminder/security/advisories/GHSA-222j-wh8m-xjrxExploitVendor Advisory
FAQ
What is CVE-2023-26034?
CVE-2023-26034 is a vulnerability with a CVSS score of 9.6 (CRITICAL). ZoneMinder is a free, open source Closed-circuit television software application for Linux which supports IP, USB and Analog cameras. Versions prior to 1.36.33 and 1.37.33 are affected by a SQL Inject...
How severe is CVE-2023-26034?
CVE-2023-26034 has been rated CRITICAL with a CVSS base score of 9.6/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-26034?
Check the references section above for vendor advisories and patch information. Affected products include: Zoneminder Zoneminder.