ZoneMinder before 1.23.3 allows remote authenticated users, and possibly unauthenticated attackers in some installations, to execute arbitrary commands via shell metacharacters in a crafted URL.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00078.html | vendor advisory |
http://www.securityfocus.com/bid/28968 | vdb entry |
http://www.awe.com/mark/blog/200804272230.html | |
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00085.html | vendor advisory |
http://secunia.com/advisories/29995 | third party advisory vendor advisory |
http://www.zoneminder.com/wiki/index.php/Change_History#Release_1.23.3 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/42046 | vdb entry |
http://secunia.com/advisories/30189 | third party advisory |