ZoneMinder Multiple Vulnerabilities


Description   (#Several vulnerabilities have been identified in ZoneMinder:#- CVE-2016-10201: reflected cross-site scripting in the "format" parameter of the "index.php?view=request&request=log&task=download&key=a9fef1f4" page. An authenticated, remote attacker can exploit it in order to execute arbitrary Javascript or HTML code by inciting their victim into following a specially formed link##- CVE-2016-10202: reflected cross-site scripting in the "index.php" page. A remote attacker can exploit it in order to execute arbitrary Javascript or HTML code by inciting their victim into following a specially formed link##- CVE-2016-10203: stored cross-site scripting in the monitor name. A remote attacker can exploit it in order to create a new monitor by inciting their victim into following a specially formed link##- CVE-2016-10204: SQL injection in the "limit" HTTP POST parameter. A remote attacker can exploit it in order to obtain information from the SQL database##- CVE-2016-10205: session fixation due to the fact that after a successful authentication the Session Cookie ZMSESSID remains the same##- CVE-2016-10206: cross-site request forgery. A remote attacker could change the password of admins by inciting them into opening a malicious link.##Proofs of concept are available.##The zoneminder packages provided by Debian Wheezy 7 are vulnerable.)
     
Vulnerable Products   Vulnerable OS:
GNU/Linux (Debian) - 7
     
Solution   No solution for the moment.
     
CVE   CVE-2016-10206
CVE-2016-10205
CVE-2016-10204
CVE-2016-10203
CVE-2016-10202
CVE-2016-10201
     
References   - Foxmole : Zoneminder multiple vulnerabilities
https://www.foxmole.com/advisories/foxmole-2016-07-05.txt
- Debian Security Tracker : zoneminder
https://security-tracker.debian.org/tracker/CVE-2016-10201
https://security-tracker.debian.org/tracker/CVE-2016-10202
https://security-tracker.debian.org/tracker/CVE-2016-10203
https://security-tracker.debian.org/tracker/CVE-2016-10204
https://security-tracker.debian.org/tracker/CVE-2016-10205
https://security-tracker.debian.org/tracker/CVE-2016-10206
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
XSS - Prevention - GET : suspicious 'iframe' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'meta' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious tag with event found in URL
3.2.0
XSS - Prevention - GET : suspicious 'applet' tag found in URL
3.2.0
XSS - Phishing : suspicious 'div' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' attribute found in URL
3.2.0
XSS - Prevention - GET : suspicious 'img' tag found in URL
3.2.0
XSS - Phishing : suspicious 'a' tag found in URL
3.2.0
XSS - Prevention - GET : cookie access attempt using script language found in URL
3.2.0
XSS - Prevention - GET : suspicious 'embed' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'object' tag found in URL
3.2.0
XSS - Phishing : suspicious 'form' tag found in URL
3.2.0
XSS - Prevention - GET : javascript code found in URL
3.2.0
XSS - Prevention - GET : evasion attempt using tag characters encoding in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' tag found in URL
3.2.0
XSS - Phishing : suspicious 'link' tag found in URL
3.2.0
XSS - Prevention - GET : 'script' tag found in URL
3.2.0
XSS - Prevention - GET : 'location' javascript object found in URL
3.2.0
XSS - Prevention - GET : suspicious 'div' tag found in URL
3.2.0
SQL injection Prevention - POST : suspicious UPDATE statement in data
5.0.0
SQL injection Prevention - POST : suspicious SELECT statement in data
5.0.0
SQL injection Prevention - POST : suspicious DECLARE statement in data
5.0.0
SQL injection Prevention - POST : suspicious OPENROWSET statement in data
5.0.0
SQL injection Prevention - POST : suspicious OPENQUERY statement in data
5.0.0
SQL injection Prevention - POST : suspicious CAST statement in data
5.0.0
SQL injection Prevention - POST : suspicious EXEC statement in data
5.0.0
SQL injection Prevention - POST : suspicious CREATE statement in data
5.0.0
SQL injection Prevention - POST : suspicious INSERT statement in data
5.0.0
SQL injection Prevention - POST : suspicious DROP statement in data
5.0.0
SQL injection Prevention - POST : suspicious HAVING statement in data
5.0.0
SQL injection Prevention - POST : suspicious UNION statement in data
5.0.0
SQL injection Prevention - POST : suspicious OR statement in data
5.0.0
SQL injection Prevention - POST : possible version probing in data
5.0.0
     


 
 
 
 
 Risk level 
Moderate 

 Vulnerability First Public Report Date 
2017-02-02 

 Target Type 
Client + Server 

 Possible exploit 
Remote