First published: Mon Feb 06 2017(Updated: )
ZoneMinder v1.30 and v1.29, an open-source CCTV server web application, is vulnerable to CSRF (Cross Site Request Forgery) which allows a remote attack to make changes to the web application as the current logged in victim. If the victim visits a malicious web page, the attacker can silently and automatically create a new admin user within the web application for remote persistence and further attacks. The URL is /zm/index.php and sample parameters could include action=user uid=0 newUser[Username]=attacker1 newUser[Password]=Password1234 conf_password=Password1234 newUser[System]=Edit (among others).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ZoneMinder | =1.29.0 | |
ZoneMinder | =1.30.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5368 is classified as a medium severity vulnerability due to its potential for exploitation via CSRF attacks.
To fix CVE-2017-5368, upgrade ZoneMinder to the latest version that addresses this CSRF vulnerability.
CVE-2017-5368 affects users of ZoneMinder versions 1.29.0 and 1.30.0.
CVE-2017-5368 can be exploited through Cross Site Request Forgery attacks, allowing unauthorized changes to the web application.
Yes, CVE-2017-5368 requires the victim to be logged in for the attacker to exploit the vulnerability successfully.