Description
|
|
(#Several vulnerabilities have been identified in ZoneMinder:#- CVE-2016-10201: reflected cross-site scripting in the "format" parameter of the "index.php?view=request&request=log&task=download&key=a9fef1f4" page. An authenticated, remote attacker can exploit it in order to execute arbitrary Javascript or HTML code by inciting their victim into following a specially formed link##- CVE-2016-10202: reflected cross-site scripting in the "index.php" page. A remote attacker can exploit it in order to execute arbitrary Javascript or HTML code by inciting their victim into following a specially formed link##- CVE-2016-10203: stored cross-site scripting in the monitor name. A remote attacker can exploit it in order to create a new monitor by inciting their victim into following a specially formed link##- CVE-2016-10204: SQL injection in the "limit" HTTP POST parameter. A remote attacker can exploit it in order to obtain information from the SQL database##- CVE-2016-10205: session fixation due to the fact that after a successful authentication the Session Cookie ZMSESSID remains the same##- CVE-2016-10206: cross-site request forgery. A remote attacker could change the password of admins by inciting them into opening a malicious link.##Proofs of concept are available.##The zoneminder packages provided by Debian Wheezy 7 are vulnerable.)
|