An issue was discovered in za-internet C-MOR Video Surveillance 5.2401. Due to improper user input validation, it is possible to download arbitrary files from the C-MOR system via a path traversal attack. It was found out that different functionalities are vulnerable to path traversal attacks, due to insufficient user input validation. For instance, the download functionality for backups provided by the script download-bkf.pml is vulnerable to a path traversal attack via the parameter bkf. This enables an authenticated user to download arbitrary files as Linux user www-data from the C-MOR system. Another path traversal attack is in the script show-movies.pml, which can be exploited via the parameter cam.
References
Link | Resource |
---|---|
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-025.txt | Exploit Vendor Advisory |
https://www.syss.de/pentest-blog/mehrere-sicherheitsschwachstellen-in-videoueberwachungssoftware-c-mor-syss-2024-020-bis-030 | Vendor Advisory |
http://seclists.org/fulldisclosure/2024/Sep/18 | Exploit Mailing List Third Party Advisory |
Configurations
History
04 Sep 2025, 16:14
Type | Values Removed | Values Added |
---|---|---|
First Time |
C-mor
C-mor c-mor Video Surveillance |
|
CPE | cpe:2.3:a:c-mor:c-mor_video_surveillance:5.2401:*:*:*:*:*:*:* | |
References | () https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-025.txt - Exploit, Vendor Advisory | |
References | () https://www.syss.de/pentest-blog/mehrere-sicherheitsschwachstellen-in-videoueberwachungssoftware-c-mor-syss-2024-020-bis-030 - Vendor Advisory | |
References | () http://seclists.org/fulldisclosure/2024/Sep/18 - Exploit, Mailing List, Third Party Advisory |
Information
Published : 2024-09-05 15:15
Updated : 2025-09-04 16:14
NVD link : CVE-2024-45178
Mitre link : CVE-2024-45178
CVE.ORG link : CVE-2024-45178
JSON object : View
Products Affected
c-mor
- c-mor_video_surveillance
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')