{"id":"CVE-2017-5595","details":"A file disclosure and inclusion vulnerability exists in web/views/file.php in ZoneMinder 1.x through v1.30.0 because of unfiltered user-input being passed to readfile(), which allows an authenticated attacker to read local system files (e.g., /etc/passwd) in the context of the web server user (www-data). The attack vector is a .. (dot dot) in the path parameter within a zm/index.php?view=file&path= request.","modified":"2026-05-18T11:38:48.717015Z","published":"2017-02-06T17:59:00.577Z","references":[{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/96125"},{"type":"FIX","url":"http://seclists.org/bugtraq/2017/Feb/6"},{"type":"FIX","url":"http://seclists.org/fulldisclosure/2017/Feb/11"},{"type":"FIX","url":"https://github.com/ZoneMinder/ZoneMinder/commit/8b19fca9927cdec07cc9dd09bdcf2496a5ae69b3"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/zoneminder/zoneminder","events":[{"introduced":"0"},{"last_affected":"e7aed10f77315505fa15f801e08ca2bb9f48e6e3"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"1.30.0"}],"cpe":"cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"versions":["v1.30.0","v1.30.0-rc2","v1.30.0-rc1","v1.29.0","v1.27.0","v1.26.5","v1.26.3","v1.26.2","v1.26.1","v1.26.0","v1.25"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-5595.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}]}