CVE-2023-41884

ZoneMinder is a free, open source Closed-circuit television software application. In WWW/AJAX/watch.php, Line: 51 takes a few parameter in sql query without sanitizing it which makes it vulnerable to sql injection. This vulnerability is fixed in 1.36.34.
Configurations

Configuration 1 (hide)

cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:*

History

13 Sep 2024, 15:08

Type Values Removed Values Added
First Time Zoneminder
Zoneminder zoneminder
CVSS v2 : unknown
v3 : 7.1
v2 : unknown
v3 : 6.5
References () https://github.com/ZoneMinder/zoneminder/commit/677f6a31551f128554f7b0110a52fd76453a657a - () https://github.com/ZoneMinder/zoneminder/commit/677f6a31551f128554f7b0110a52fd76453a657a - Patch
References () https://github.com/ZoneMinder/zoneminder/commit/a194fe81d34c5eea2ab1dc18dc8df615fca634a6 - () https://github.com/ZoneMinder/zoneminder/commit/a194fe81d34c5eea2ab1dc18dc8df615fca634a6 - Patch
References () https://github.com/ZoneMinder/zoneminder/security/advisories/GHSA-2qp3-fwpv-mc96 - () https://github.com/ZoneMinder/zoneminder/security/advisories/GHSA-2qp3-fwpv-mc96 - Exploit, Third Party Advisory
CPE cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:*

13 Aug 2024, 12:58

Type Values Removed Values Added
Summary
  • (es) ZoneMinder es una aplicación de software de circuito cerrado de televisión gratuita y de código abierto. En WWW/AJAX/watch.php, Línea: 51 toma algunos parámetros en la consulta SQL sin desinfectarlos, lo que lo hace vulnerable a la inyección de SQL. Esta vulnerabilidad se solucionó en 1.36.34.

12 Aug 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-12 20:15

Updated : 2024-09-13 15:08


NVD link : CVE-2023-41884

Mitre link : CVE-2023-41884

CVE.ORG link : CVE-2023-41884


JSON object : View

Products Affected

zoneminder

  • zoneminder
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')