ZoneMinder before 1.36.13 allows remote code execution via an invalid language. Ability to create a debug log file at an arbitrary pathname contributes to exploitability.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://forums.zoneminder.com/viewtopic.php?t=31638 | release notes vendor advisory |
https://github.com/ZoneMinder/zoneminder/releases/tag/1.36.13 | third party advisory release notes |
https://github.com/ZoneMinder/zoneminder/commit/9fee64b62fbdff5bf5ece1d617f1f53c7b1967cb | third party advisory patch |
https://krastanoel.com/cve/2022-29806 | third party advisory exploit |
http://packetstormsecurity.com/files/166980/ZoneMinder-Language-Settings-Remote-Code-Execution.html | third party advisory exploit |