First published: Sat Feb 25 2023(Updated: )
ZoneMinder is a free, open source Closed-circuit television software application for Linux which supports IP, USB and Analog cameras. Versions prior to 1.36.33 and 1.37.33 are affected by a SQL Injection vulnerability. The (blind) SQL Injection vulnerability is present within the `filter[Query][terms][0][attr]` query string parameter of the `/zm/index.php` endpoint. A user with the View or Edit permissions of Events may execute arbitrary SQL. The resulting impact can include unauthorized data access (and modification), authentication and/or authorization bypass, and remote code execution.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Zoneminder Zoneminder | <1.36.33 | |
Zoneminder Zoneminder | >=1.37.00<1.37.33 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-26034 is a SQL Injection vulnerability in ZoneMinder, a closed-circuit television software application for Linux.
The severity of CVE-2023-26034 is critical with a CVSS score of 8.8.
Versions prior to 1.36.33 and 1.37.33 of ZoneMinder are affected by CVE-2023-26034.
To fix CVE-2023-26034, update ZoneMinder to version 1.36.33 or later for the 1.36.x series, or update to version 1.37.33 or later for the 1.37.x series.
Yes, you can find additional information about CVE-2023-26034 in the advisory at: https://github.com/ZoneMinder/zoneminder/security/advisories/GHSA-222j-wh8m-xjrx