ZoneMinder v1.30 and v1.29, an open-source CCTV server web application, is vulnerable to CSRF (Cross Site Request Forgery) which allows a remote attack to make changes to the web application as the current logged in victim. If the victim visits a malicious web page, the attacker can silently and automatically create a new admin user within the web application for remote persistence and further attacks. The URL is /zm/index.php and sample parameters could include action=user uid=0 newUser[Username]=attacker1 newUser[Password]=Password1234 conf_password=Password1234 newUser[System]=Edit (among others).
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Zoneminder | Zoneminder | 1.29.0 (including) | 1.29.0 (including) |
Zoneminder | Zoneminder | 1.30.0 (including) | 1.30.0 (including) |
Zoneminder | Ubuntu | artful | * |
Zoneminder | Ubuntu | esm-apps/xenial | * |
Zoneminder | Ubuntu | precise | * |
Zoneminder | Ubuntu | trusty | * |
Zoneminder | Ubuntu | upstream | * |
Zoneminder | Ubuntu | xenial | * |
Zoneminder | Ubuntu | yakkety | * |
Zoneminder | Ubuntu | zesty | * |