The Username field of the JWT token was trusted when performing an SQL query to load the user. If an attacker could determine the HASH key used by ZoneMinder, they could generate a malicious JWT token and use it to execute arbitrary SQL.
Patches
Fixed by decf3e3. Versions 1.36.33 or 1.37.33 onwards contain the fix.
Impact
The Username field of the JWT token was trusted when performing an SQL query to load the user. If an attacker could determine the HASH key used by ZoneMinder, they could generate a malicious JWT token and use it to execute arbitrary SQL.
Patches
Fixed by decf3e3. Versions 1.36.33 or 1.37.33 onwards contain the fix.
Workarounds
Apply patch manually.