PatchSiren

PatchSiren cyber security CVE debrief

CVE-2017-5595 Zoneminder CVE debrief

CVE-2017-5595 is an authenticated local file disclosure issue in ZoneMinder 1.x through v1.30.0. NVD describes it as unfiltered user input being passed to readfile() in web/views/file.php, enabling a low-privileged authenticated attacker to read files from the server’s filesystem via path traversal in the path parameter. The published CVSS v3.0 vector is AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N, reflecting a confidentiality-focused issue rather than an integrity or availability impact.

Vendor
Zoneminder
Product
CVE-2017-5595
CVSS
MEDIUM 5.5
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-06
Original CVE updated
2026-05-13
Advisory published
2017-02-06
Advisory updated
2026-05-13

Who should care

ZoneMinder administrators, defenders responsible for shared or multi-user ZoneMinder deployments, and teams with authenticated but low-privilege users who can access the web interface. Systems where the web server account can read sensitive local files are the primary concern.

Technical summary

NVD lists the weakness as CWE-200 and scopes it to ZoneMinder versions up to and including 1.30.0. The issue is in web/views/file.php, where user-controlled input is used in a file read operation without adequate filtering. According to the CVE description, an authenticated attacker can supply dot-dot path traversal sequences in zm/index.php?view=file&path= requests to read local system files in the context of the web server user.

Defensive priority

Medium. The issue requires authentication and local access, but it can expose sensitive files from the server filesystem. Prioritize it if ZoneMinder authentication is available to multiple users, if the server stores secrets or credentials on disk, or if the application runs with broad filesystem read access.

Recommended defensive actions

  • Apply the vendor fix referenced in the ZoneMinder GitHub commit linked in the CVE record.
  • Restrict access to ZoneMinder authentication and administrative roles to trusted users only.
  • Review whether the web server account has unnecessary read access to sensitive local files and reduce filesystem exposure where possible.
  • Monitor for unusual requests to zm/index.php?view=file&path= and path traversal patterns in application logs.
  • Inventory systems running ZoneMinder 1.x through v1.30.0 and confirm they are updated or otherwise remediated.

Evidence notes

The CVE record and NVD detail identify the affected product as ZoneMinder 1.x through v1.30.0, with a CVSS v3.0 vector of AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N and weakness CWE-200. The referenced ZoneMinder GitHub commit is tagged as a vendor advisory/patch. MITRE-listed references include Bugtraq, Full Disclosure, and SecurityFocus entries from February 2017, consistent with the CVE’s public disclosure timeframe.

Official resources

The CVE was published on 2017-02-06, and the supporting advisories and vendor patch reference are from February 2017. This debrief uses the CVE publication date as the disclosure anchor.