First published: Tue Mar 21 2017(Updated: )
A Cross-Site Scripting (XSS) was discovered in ZoneMinder before 1.30.2. The vulnerability exists due to insufficient filtration of user-supplied data (postLoginQuery) passed to the "ZoneMinder-master/web/skins/classic/views/js/postlogin.js.php" URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ZoneMinder | =1.30.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7203 is classified as a medium severity vulnerability due to its potential for Cross-Site Scripting (XSS) attacks.
To resolve CVE-2017-7203, upgrade to ZoneMinder version 1.30.2 or later, which includes patches for this vulnerability.
CVE-2017-7203 is a Cross-Site Scripting (XSS) vulnerability that allows an attacker to execute arbitrary scripts in the context of a user's browser.
CVE-2017-7203 affects ZoneMinder versions prior to 1.30.2, specifically impacting the handling of user-supplied data.
Yes, CVE-2017-7203 can be exploited remotely by an attacker through a malicious payload in web requests to the affected ZoneMinder installation.