ZoneMinder is a free, open source Closed-circuit television software application. In WWW/AJAX/watch.php, Line: 51 takes a few parameter in sql query without sanitizing it which makes it vulnerable to sql injection. This vulnerability is fixed in 1.36.34.
References
Configurations
History
13 Sep 2024, 15:08
Type | Values Removed | Values Added |
---|---|---|
First Time |
Zoneminder
Zoneminder zoneminder |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
References | () https://github.com/ZoneMinder/zoneminder/commit/677f6a31551f128554f7b0110a52fd76453a657a - Patch | |
References | () https://github.com/ZoneMinder/zoneminder/commit/a194fe81d34c5eea2ab1dc18dc8df615fca634a6 - Patch | |
References | () https://github.com/ZoneMinder/zoneminder/security/advisories/GHSA-2qp3-fwpv-mc96 - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:* |
13 Aug 2024, 12:58
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
12 Aug 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-12 20:15
Updated : 2024-09-13 15:08
NVD link : CVE-2023-41884
Mitre link : CVE-2023-41884
CVE.ORG link : CVE-2023-41884
JSON object : View
Products Affected
zoneminder
- zoneminder
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')