High severity8.8NVD Advisory· Published Feb 6, 2017· Updated May 13, 2026
CVE-2017-5368
CVE-2017-5368
Description
ZoneMinder v1.30 and v1.29, an open-source CCTV server web application, is vulnerable to CSRF (Cross Site Request Forgery) which allows a remote attack to make changes to the web application as the current logged in victim. If the victim visits a malicious web page, the attacker can silently and automatically create a new admin user within the web application for remote persistence and further attacks. The URL is /zm/index.php and sample parameters could include action=user uid=0 newUser[Username]=attacker1 newUser[Password]=Password1234 conf_password=Password1234 newUser[System]=Edit (among others).
Affected products
2cpe:2.3:a:zoneminder:zoneminder:1.29.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:zoneminder:zoneminder:1.29.0:*:*:*:*:*:*:*
- cpe:2.3:a:zoneminder:zoneminder:1.30.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- seclists.org/bugtraq/2017/Feb/6nvdExploitThird Party AdvisoryVDB Entry
- seclists.org/fulldisclosure/2017/Feb/11nvdExploitThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/96126nvd
News mentions
0No linked articles in our index yet.