ZoneMinder before 1.36.13 allows remote code execution via an invalid language. Ability to create a debug log file at an arbitrary pathname contributes to exploitability.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/166980/ZoneMinder-Language-Settings-Remote-Code-Execution.html | Exploit Third Party Advisory |
https://forums.zoneminder.com/viewtopic.php?t=31638 | Release Notes Vendor Advisory |
https://github.com/ZoneMinder/zoneminder/commit/9fee64b62fbdff5bf5ece1d617f1f53c7b1967cb | Patch Third Party Advisory |
https://github.com/ZoneMinder/zoneminder/releases/tag/1.36.13 | Release Notes Third Party Advisory |
https://krastanoel.com/cve/2022-29806 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2022-04-26 04:15
Updated : 2024-02-28 19:09
NVD link : CVE-2022-29806
Mitre link : CVE-2022-29806
CVE.ORG link : CVE-2022-29806
JSON object : View
Products Affected
zoneminder
- zoneminder
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')