Closed
Description
Describe Your Environment
- ZoneMinder v1.33.1
- Installed from - ppa:iconnor/zoneminder-master
Describe the bug
A user can edit an existing monitor thereby modifying various misc properties, one of them being signal check color. There exists no input validation & output filtration, leaving it vulnerable to HTML Injection, XSS attack.
To Reproduce
Affected URL :
http://localhost/zm/index.php?view=monitor&tab=misc
Payload used - "><a href="javascript:alert('1')
- Navigate to the Affected URL & modify the Signal check Color field with the provided payload & click on save.
- Click on the color box, XSS would be triggered.
Expected behavior
- Proper escaping of special characters.
Debug Logs
None
