Skip to content

SQL injection via malicious jwt token

High
connortechnology published GHSA-6c72-q9mw-mwx9 Feb 24, 2023

Package

zoneminder (ZoneMinder)

Affected versions

< 1.36.33, < 1.37.33

Patched versions

1.36.33, 1.37.33

Description

Impact

The Username field of the JWT token was trusted when performing an SQL query to load the user. If an attacker could determine the HASH key used by ZoneMinder, they could generate a malicious JWT token and use it to execute arbitrary SQL.

Patches

Fixed by decf3e3. Versions 1.36.33 or 1.37.33 onwards contain the fix.

Workarounds

Apply patch manually.

Severity

High
8.9
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
None
User interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
Low
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L

CVE ID

CVE-2023-26032

Weaknesses

No CWEs

Credits