Skip to content

Self - Stored Cross Site Scripting (XSS) - monitor.php #2451

Closed
@Loginsoft-Research

Description

@Loginsoft-Research

Describe Your Environment

  • ZoneMinder v1.33.1
  • Installed from - ppa:iconnor/zoneminder-master

Describe the bug
A user can edit an existing monitor thereby modifying various misc properties, one of them being signal check color. There exists no input validation & output filtration, leaving it vulnerable to HTML Injection, XSS attack.

To Reproduce
Affected URL :
http://localhost/zm/index.php?view=monitor&tab=misc

Payload used - "><a href="javascript:alert('1')

  • Navigate to the Affected URL & modify the Signal check Color field with the provided payload & click on save.
  • Click on the color box, XSS would be triggered.

colour

Expected behavior

  • Proper escaping of special characters.

Debug Logs


None

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions