Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2022-39285 — Cross-site Scripting in Zoneminder
Severity
5.4MEDIUMNVD
EPSS
1.9%
top 16.96%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedOct 7
Latest updateMar 27
Description
ZoneMinder is a free, open source Closed-circuit television software application The file parameter is vulnerable to a cross site scripting vulnerability (XSS) by backing out of the current "tr" "td" brackets. This then allows a malicious user to provide code that will execute when a user views the specific log on the "view=log" page. This vulnerability allows an attacker to store code within the logs that will be executed when loaded by a legitimate user. These actions will be performed with th…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NExploitability: 2.3 | Impact: 2.7
Affected Packages4 packages
Patches
🔴Vulnerability Details
1OSV▶
CVE-2022-39285: ZoneMinder is a free, open source Closed-circuit television software application The file parameter is vulnerable to a cross site scripting vulnerabil↗2022-10-07
💥Exploits & PoCs
1📋Vendor Advisories
1Debian▶
CVE-2022-39285: zoneminder - ZoneMinder is a free, open source Closed-circuit television software application...↗2022