CVE-2023-26038 affects ZoneMinder versions < 1.36.33 and >= 1.37.0, allowing attackers to manipulate file paths and potentially execute unauthorized code. Learn more.
This CVE-2023-26038 relates to a Local File Inclusion vulnerability found in ZoneMinder software via
web/ajax/modal.php
.
Understanding CVE-2023-26038
This vulnerability affects ZoneMinder, a free, open-source Closed-circuit television software application for Linux. It exposes versions prior to 1.36.33 and 1.37.33 to potential exploitation through the manipulation of file paths.
What is CVE-2023-26038?
The CVE-2023-26038 vulnerability in ZoneMinder allows attackers to include arbitrary PHP file paths in the request, leading to unauthorized access and potential code execution. This issue poses a significant security risk to systems running affected versions of the software.
The Impact of CVE-2023-26038
The impact of CVE-2023-26038 is rated as medium severity with a CVSS base score of 5.4. While the attack complexity is low, the confidentiality and integrity impacts are both rated as low. This vulnerability does not require high privileges or user interaction to be exploited.
Technical Details of CVE-2023-26038
The following technical details describe the vulnerability in more depth:
Vulnerability Description
The CVE-2023-26038 vulnerability in ZoneMinder arises from a Local File Inclusion (Untrusted Search Path) issue via the
web/ajax/modal.php
file, allowing attackers to pass arbitrary PHP file paths in the request.
Affected Systems and Versions
The vulnerability impacts ZoneMinder versions earlier than 1.36.33 and 1.37.33. Specifically, versions "< 1.36.33" and ">= 1.37.0, < 1.37.33" are confirmed to be affected by this security flaw.
Exploitation Mechanism
Attackers can exploit CVE-2023-26038 by leveraging the Local File Inclusion vulnerability in ZoneMinder to manipulate file paths via the
web/ajax/modal.php
file, potentially leading to unauthorized access and code execution.
Mitigation and Prevention
To address CVE-2023-26038 and enhance the security of ZoneMinder installations, the following mitigation and prevention steps are recommended:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Stay informed about security updates and patches released by ZoneMinder to address known vulnerabilities and ensure the timely application of these fixes to protect against potential threats.