First published: Thu Sep 05 2024(Updated: )
An issue was discovered in za-internet C-MOR Video Surveillance 5.2401. Due to improper privilege management concerning sudo privileges, C-MOR is vulnerable to a privilege escalation attack. The Linux user www-data running the C-MOR web interface can execute some OS commands as root via Sudo without having to enter the root password. These commands, for example, include cp, chown, and chmod, which enable an attacker to modify the system's sudoers file in order to execute all commands with root privileges. Thus, it is possible to escalate the limited privileges of the user www-data to root privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
C-MOR Video Surveillance |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45173 has a high severity due to its potential for privilege escalation.
To fix CVE-2024-45173, ensure that proper privilege management is implemented and restrict unnecessary sudo access for the www-data user.
CVE-2024-45173 impacts the za-internet C-MOR Video Surveillance software version 5.2401.
Yes, CVE-2024-45173 can potentially be exploited remotely due to the vulnerabilities in the web interface.
Failure to address CVE-2024-45173 may allow attackers to escalate privileges and execute commands as root, jeopardizing system security.