CVE-2024-51482 Scanner

CVE-2024-51482 Scanner - SQL Injection vulnerability in ZoneMinder

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

3 weeks 17 hours

Scan only one

Domain, IPv4, Subdomain

Toolbox

-

ZoneMinder is a free and open-source software solution widely used for closed-circuit television (CCTV) systems. It allows users to monitor, record, and analyze video footage for security and surveillance purposes. Typically deployed in homes, businesses, and public spaces, ZoneMinder provides functionality to manage multiple cameras and review recorded footage efficiently. The software is actively maintained by the developer community, which offers updates and improvements. It is compatible with various operating systems, including Linux-based systems, and provides a user-friendly web-based interface. ZoneMinder also supports integration with other applications for enhanced security workflows.

This scanner detects a critical SQL Injection vulnerability in ZoneMinder. The flaw lies in the `event.php` endpoint of the application, which fails to sanitize user inputs properly. Exploitation of this vulnerability allows attackers to execute arbitrary SQL commands within the ZoneMinder database. By crafting malicious queries, attackers can manipulate database content, steal sensitive data, and potentially escalate their privileges within the system. The issue has been patched in version 1.37.65, mitigating the risk of exploitation.

The vulnerability is caused by inadequate input validation in the `action` parameter in `event.php`. Attackers can exploit this flaw using boolean-based SQL injection techniques. The endpoint fails to handle crafted inputs appropriately, leading to database queries executing without validation. Attackers may use sleep-based payloads to verify successful injection and identify vulnerabilities. Such vulnerabilities compromise the confidentiality, integrity, and availability of the ZoneMinder system.

If exploited, the vulnerability allows attackers to gain unauthorized access to sensitive information stored in the database. This includes user credentials, configuration settings, and recorded footage. Attackers can delete or corrupt data, rendering the system unusable. Furthermore, they could execute administrative operations, escalate privileges, and use the compromised system as a launching point for further attacks.

REFERENCES

Get started to protecting your Free Full Security Scan