CVE-2024-45178

7.1 HIGH

📋 TL;DR

CVE-2024-45178 is a path traversal vulnerability in za-internet C-MOR Video Surveillance 5.2401 that allows authenticated attackers to download arbitrary files from the system. The vulnerability exists in multiple scripts including download-bkf.pml and show-movies.pml due to insufficient input validation. This affects organizations using vulnerable versions of C-MOR video surveillance software.

💻 Affected Systems

Products:
  • za-internet C-MOR Video Surveillance
Versions: 5.2401 and likely earlier versions
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authentication to exploit, but default installations are vulnerable. The system runs as Linux user www-data.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could download sensitive system files, configuration files, or credential data, potentially leading to full system compromise and surveillance footage theft.

🟠

Likely Case

Authenticated users or attackers who gain authentication can exfiltrate sensitive configuration files, backup data, or surveillance footage.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the web application server files accessible to the www-data user.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authentication but is straightforward via path traversal in bkf and cam parameters. Public disclosure includes technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not provided in references

Restart Required: No

Instructions:

1. Check vendor website for security updates
2. Apply any available patches
3. Monitor za-internet security advisories
4. Consider upgrading to latest version if patch not available

🔧 Temporary Workarounds

Input Validation Enhancement

linux

Implement strict input validation for file path parameters in affected scripts

# Modify download-bkf.pml and show-movies.pml to validate file paths
# Example: if ".." in param: reject request
# Implement allowlist of permitted file paths

Web Server Configuration

linux

Restrict web server permissions and implement directory traversal protections

# In Apache: Options -Indexes -FollowSymLinks
# In Nginx: disable autoindex
# Set open_basedir restrictions in PHP if applicable

🧯 If You Can't Patch

  • Implement network segmentation to isolate C-MOR systems from sensitive networks
  • Enable strict access controls and monitor for unusual file download patterns

🔍 How to Verify

Check if Vulnerable:

Test if you can access files outside intended directories using path traversal sequences in bkf or cam parameters

Check Version:

# Check C-MOR version in web interface or configuration files
# Typically found in /var/www/html/ or similar web directory

Verify Fix Applied:

Attempt path traversal attacks after applying fixes; successful attacks should be blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in web server logs
  • Multiple requests with ".." sequences in parameters
  • Access to sensitive system files from web user www-data

Network Indicators:

  • Unusually large downloads from C-MOR web interface
  • Requests to non-standard file paths

SIEM Query:

web.url:*download-bkf.pml* AND (web.param:*..* OR web.param:*../*)

🔗 References

📤 Share & Export