CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
EPSS
Percentile
22.9%
A file disclosure and inclusion vulnerability exists in web/views/file.php
in ZoneMinder 1.x through v1.30.0 because of unfiltered user-input being
passed to readfile(), which allows an authenticated attacker to read local
system files (e.g., /etc/passwd) in the context of the web server user
(www-data). The attack vector is a … (dot dot) in the path parameter
within a zm/index.php?view=file&path= request.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 16.04 | noarch | zoneminder | < any | UNKNOWN |
seclists.org/bugtraq/2017/Feb/6
seclists.org/fulldisclosure/2017/Feb/11
www.openwall.com/lists/oss-security/2017/02/05/1
github.com/ZoneMinder/ZoneMinder/commit/8b19fca9927cdec07cc9dd09bdcf2496a5ae69b3
launchpad.net/bugs/cve/CVE-2017-5595
nvd.nist.gov/vuln/detail/CVE-2017-5595
security-tracker.debian.org/tracker/CVE-2017-5595
www.cve.org/CVERecord?id=CVE-2017-5595
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
EPSS
Percentile
22.9%