First published: Sat Feb 25 2023(Updated: )
ZoneMinder is a free, open source Closed-circuit television software application for Linux which supports IP, USB and Analog cameras. Versions prior to 1.36.33 and 1.37.33 contain SQL Injection via malicious jason web token. The Username field of the JWT token was trusted when performing an SQL query to load the user. If an attacker could determine the HASH key used by ZoneMinder, they could generate a malicious JWT token and use it to execute arbitrary SQL. This issue is fixed in versions 1.36.33 and 1.37.33.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Zoneminder Zoneminder | <1.36.33 | |
Zoneminder Zoneminder | >=1.37.00<1.37.33 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZoneMinder is a free open-source Closed-circuit television software application for Linux.
The vulnerability ID is CVE-2023-26032.
The severity of CVE-2023-26032 is high.
CVE-2023-26032 allows SQL Injection via a malicious JSON web token in ZoneMinder.
To fix CVE-2023-26032, update ZoneMinder to a version equal to or higher than 1.36.33 or 1.37.33.