First published: Fri Oct 07 2022(Updated: )
ZoneMinder is a free, open source Closed-circuit television software application. In affected versions authenticated users can bypass CSRF keys by modifying the request supplied to the Zoneminder web application. These modifications include replacing HTTP POST with an HTTP GET and removing the CSRF key from the request. An attacker can take advantage of this by using an HTTP GET request to perform actions with no CSRF protection. This could allow an attacker to cause an authenticated user to perform unexpected actions on the web application. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Zoneminder Zoneminder | <1.36.27 | |
Zoneminder Zoneminder | >1.37.0<1.37.24 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-39290 is a vulnerability in the ZoneMinder software application that allows authenticated users to bypass CSRF keys.
An attacker can exploit CVE-2022-39290 by modifying the request supplied to the ZoneMinder web application, replacing HTTP POST with an HTTP GET and removing the CSRF keys.
The severity of CVE-2022-39290 is high with a CVSS score of 6.5.
ZoneMinder versions up to 1.36.27 and versions between 1.37.0 and 1.37.24 are affected by CVE-2022-39290.
Yes, upgrading to a patched version of ZoneMinder is recommended to fix CVE-2022-39290.