ZoneMinder before 1.36.13 allows remote code execution via an invalid language. Ability to create a debug log file at an arbitrary pathname contributes to exploitability.
References
| Link | Resource |
|---|---|
| http://packetstormsecurity.com/files/166980/ZoneMinder-Language-Settings-Remote-Code-Execution.html | Exploit Third Party Advisory |
| https://forums.zoneminder.com/viewtopic.php?t=31638 | Release Notes Vendor Advisory |
| https://github.com/ZoneMinder/zoneminder/commit/9fee64b62fbdff5bf5ece1d617f1f53c7b1967cb | Patch Third Party Advisory |
| https://github.com/ZoneMinder/zoneminder/releases/tag/1.36.13 | Release Notes Third Party Advisory |
| https://krastanoel.com/cve/2022-29806 | Exploit Third Party Advisory |
| http://packetstormsecurity.com/files/166980/ZoneMinder-Language-Settings-Remote-Code-Execution.html | Exploit Third Party Advisory |
| https://forums.zoneminder.com/viewtopic.php?t=31638 | Release Notes Vendor Advisory |
| https://github.com/ZoneMinder/zoneminder/commit/9fee64b62fbdff5bf5ece1d617f1f53c7b1967cb | Patch Third Party Advisory |
| https://github.com/ZoneMinder/zoneminder/releases/tag/1.36.13 | Release Notes Third Party Advisory |
| https://krastanoel.com/cve/2022-29806 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:59
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://packetstormsecurity.com/files/166980/ZoneMinder-Language-Settings-Remote-Code-Execution.html - Exploit, Third Party Advisory | |
| References | () https://forums.zoneminder.com/viewtopic.php?t=31638 - Release Notes, Vendor Advisory | |
| References | () https://github.com/ZoneMinder/zoneminder/commit/9fee64b62fbdff5bf5ece1d617f1f53c7b1967cb - Patch, Third Party Advisory | |
| References | () https://github.com/ZoneMinder/zoneminder/releases/tag/1.36.13 - Release Notes, Third Party Advisory | |
| References | () https://krastanoel.com/cve/2022-29806 - Exploit, Third Party Advisory |
06 May 2022, 13:07
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-22 | |
| References | (MISC) https://forums.zoneminder.com/viewtopic.php?t=31638 - Release Notes, Vendor Advisory | |
| References | (MISC) https://krastanoel.com/cve/2022-29806 - Exploit, Third Party Advisory | |
| References | (MISC) https://github.com/ZoneMinder/zoneminder/commit/9fee64b62fbdff5bf5ece1d617f1f53c7b1967cb - Patch, Third Party Advisory | |
| References | (MISC) http://packetstormsecurity.com/files/166980/ZoneMinder-Language-Settings-Remote-Code-Execution.html - Exploit, Third Party Advisory | |
| References | (MISC) https://github.com/ZoneMinder/zoneminder/releases/tag/1.36.13 - Release Notes, Third Party Advisory | |
| CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
| CPE | cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:* |
05 May 2022, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
27 Apr 2022, 06:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | ZoneMinder before 1.36.13 allows remote code execution via an invalid language. Ability to create a debug log file at an arbitrary pathname contributes to exploitability. | |
| References |
|
26 Apr 2022, 04:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2022-04-26 04:15
Updated : 2024-11-21 06:59
NVD link : CVE-2022-29806
Mitre link : CVE-2022-29806
CVE.ORG link : CVE-2022-29806
JSON object : View
Products Affected
zoneminder
- zoneminder
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
