First published: Thu Sep 05 2024(Updated: )
An issue was discovered in za-internet C-MOR Video Surveillance 5.2401. Due to improper user input validation, it is possible to download arbitrary files from the C-MOR system via a path traversal attack. It was found out that different functionalities are vulnerable to path traversal attacks, due to insufficient user input validation. For instance, the download functionality for backups provided by the script download-bkf.pml is vulnerable to a path traversal attack via the parameter bkf. This enables an authenticated user to download arbitrary files as Linux user www-data from the C-MOR system. Another path traversal attack is in the script show-movies.pml, which can be exploited via the parameter cam.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
C-MOR Video Surveillance |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45178 is considered a high severity vulnerability due to its potential exploitation in unauthorized file downloads.
To fix CVE-2024-45178, ensure that user input validation is properly implemented to prevent path traversal attacks.
CVE-2024-45178 affects the C-MOR Video Surveillance software developed by za-internet.
CVE-2024-45178 involves a path traversal attack that allows unauthorized file access.
Yes, CVE-2024-45178 can be exploited by unprivileged users, allowing them to download arbitrary files.