Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-7337

Опубликовано: 04 фев. 2019
Источник: debian
EPSS Низкий

Описание

Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3 as the view 'events' (events.php) insecurely displays the limit parameter value, without applying any proper output filtration. This issue exists because of the function sortHeader() in functions.php, which insecurely returns the value of the limit query string parameter without applying any filtration.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
zoneminderfixed1.34.6-1package

Примечания

  • https://github.com/ZoneMinder/zoneminder/issues/2456

  • https://github.com/ZoneMinder/zoneminder/commit/fcbc22b6a27b2375327327c3d75995fe6a3cafd9

  • See README.Debian.security, only supported behind an authenticated HTTP zone

EPSS

Процентиль: 55%
0.00321
Низкий

Связанные уязвимости

CVSS3: 4.8
ubuntu
около 7 лет назад

Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3 as the view 'events' (events.php) insecurely displays the limit parameter value, without applying any proper output filtration. This issue exists because of the function sortHeader() in functions.php, which insecurely returns the value of the limit query string parameter without applying any filtration.

CVSS3: 4.8
nvd
около 7 лет назад

Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3 as the view 'events' (events.php) insecurely displays the limit parameter value, without applying any proper output filtration. This issue exists because of the function sortHeader() in functions.php, which insecurely returns the value of the limit query string parameter without applying any filtration.

CVSS3: 4.8
github
больше 3 лет назад

Reflected Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3 as the view 'events' (events.php) insecurely displays the limit parameter value, without applying any proper output filtration. This issue exists because of the function sortHeader() in functions.php, which insecurely returns the value of the limit query string parameter without applying any filtration.

EPSS

Процентиль: 55%
0.00321
Низкий