CVE-2024-45178: n/a
An issue was discovered in za-internet C-MOR Video Surveillance 5.2401. Due to improper user input validation, it is possible to download arbitrary files from the C-MOR system via a path traversal attack. It was found out that different functionalities are vulnerable to path traversal attacks, due to insufficient user input validation. For instance, the download functionality for backups provided by the script download-bkf.pml is vulnerable to a path traversal attack via the parameter bkf. This enables an authenticated user to download arbitrary files as Linux user www-data from the C-MOR system. Another path traversal attack is in the script show-movies.pml, which can be exploited via the parameter cam.
AI Analysis
Technical Summary
CVE-2024-45178 is a path traversal vulnerability identified in the za-internet C-MOR Video Surveillance software version 5.2401. The root cause is improper user input validation in multiple scripts, notably download-bkf.pml and show-movies.pml, which handle backup downloads and video footage access respectively. By manipulating parameters such as 'bkf' and 'cam', an authenticated attacker can traverse the file system and download arbitrary files from the server running the C-MOR system. The files are accessed with the permissions of the Linux user 'www-data', which is typically the web server user. This vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory). The CVSS v3.1 base score is 7.1, reflecting a high severity due to network attack vector, low attack complexity, required privileges (authenticated user), no user interaction, and high impact on confidentiality. While integrity impact is low and availability is unaffected, the ability to exfiltrate sensitive files poses a significant risk. No patches or exploits are currently publicly available, but the vulnerability is published and known since early September 2024. This flaw could be exploited to access configuration files, credentials, or other sensitive data stored on the surveillance system, potentially leading to further compromise or data leakage.
Potential Impact
The primary impact of CVE-2024-45178 is unauthorized disclosure of sensitive information due to arbitrary file download capability. Attackers with valid credentials can access confidential files such as system configurations, backup data, or logs, which may contain passwords, network details, or personally identifiable information captured by the surveillance system. This breach of confidentiality can lead to further attacks, including lateral movement within the network or targeted espionage. Although the vulnerability does not allow direct code execution or system disruption, the exposure of sensitive files can undermine organizational security posture. Surveillance systems are often deployed in critical infrastructure, government, and enterprise environments, increasing the risk of significant operational and reputational damage. The requirement for authentication limits exploitation to insiders or compromised accounts, but the low complexity and network accessibility make it a serious threat. Organizations worldwide relying on C-MOR Video Surveillance systems should consider this vulnerability a high risk to data confidentiality.
Mitigation Recommendations
To mitigate CVE-2024-45178, organizations should first check for official patches or updates from za-internet and apply them promptly once available. In the absence of patches, implement strict access controls to limit authenticated user privileges, ensuring only trusted personnel have access to the surveillance system. Employ network segmentation to isolate the C-MOR system from broader enterprise networks, reducing exposure. Monitor and audit user activities on the system to detect unusual file access patterns indicative of exploitation attempts. Consider deploying web application firewalls (WAFs) with custom rules to detect and block path traversal payloads targeting vulnerable parameters like 'bkf' and 'cam'. Additionally, review and harden the web server configuration to restrict file system access and disable unnecessary functionalities. Regularly back up critical data and maintain incident response plans to quickly address potential breaches. Finally, educate users about the importance of strong authentication and monitoring to prevent credential compromise.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, China, Canada, Australia, Netherlands
CVE-2024-45178: n/a
Description
An issue was discovered in za-internet C-MOR Video Surveillance 5.2401. Due to improper user input validation, it is possible to download arbitrary files from the C-MOR system via a path traversal attack. It was found out that different functionalities are vulnerable to path traversal attacks, due to insufficient user input validation. For instance, the download functionality for backups provided by the script download-bkf.pml is vulnerable to a path traversal attack via the parameter bkf. This enables an authenticated user to download arbitrary files as Linux user www-data from the C-MOR system. Another path traversal attack is in the script show-movies.pml, which can be exploited via the parameter cam.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-45178 is a path traversal vulnerability identified in the za-internet C-MOR Video Surveillance software version 5.2401. The root cause is improper user input validation in multiple scripts, notably download-bkf.pml and show-movies.pml, which handle backup downloads and video footage access respectively. By manipulating parameters such as 'bkf' and 'cam', an authenticated attacker can traverse the file system and download arbitrary files from the server running the C-MOR system. The files are accessed with the permissions of the Linux user 'www-data', which is typically the web server user. This vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory). The CVSS v3.1 base score is 7.1, reflecting a high severity due to network attack vector, low attack complexity, required privileges (authenticated user), no user interaction, and high impact on confidentiality. While integrity impact is low and availability is unaffected, the ability to exfiltrate sensitive files poses a significant risk. No patches or exploits are currently publicly available, but the vulnerability is published and known since early September 2024. This flaw could be exploited to access configuration files, credentials, or other sensitive data stored on the surveillance system, potentially leading to further compromise or data leakage.
Potential Impact
The primary impact of CVE-2024-45178 is unauthorized disclosure of sensitive information due to arbitrary file download capability. Attackers with valid credentials can access confidential files such as system configurations, backup data, or logs, which may contain passwords, network details, or personally identifiable information captured by the surveillance system. This breach of confidentiality can lead to further attacks, including lateral movement within the network or targeted espionage. Although the vulnerability does not allow direct code execution or system disruption, the exposure of sensitive files can undermine organizational security posture. Surveillance systems are often deployed in critical infrastructure, government, and enterprise environments, increasing the risk of significant operational and reputational damage. The requirement for authentication limits exploitation to insiders or compromised accounts, but the low complexity and network accessibility make it a serious threat. Organizations worldwide relying on C-MOR Video Surveillance systems should consider this vulnerability a high risk to data confidentiality.
Mitigation Recommendations
To mitigate CVE-2024-45178, organizations should first check for official patches or updates from za-internet and apply them promptly once available. In the absence of patches, implement strict access controls to limit authenticated user privileges, ensuring only trusted personnel have access to the surveillance system. Employ network segmentation to isolate the C-MOR system from broader enterprise networks, reducing exposure. Monitor and audit user activities on the system to detect unusual file access patterns indicative of exploitation attempts. Consider deploying web application firewalls (WAFs) with custom rules to detect and block path traversal payloads targeting vulnerable parameters like 'bkf' and 'cam'. Additionally, review and harden the web server configuration to restrict file system access and disable unnecessary functionalities. Regularly back up critical data and maintain incident response plans to quickly address potential breaches. Finally, educate users about the importance of strong authentication and monitoring to prevent credential compromise.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-08-22T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6ceab7ef31ef0b56a29c
Added to database: 2/25/2026, 9:43:06 PM
Last enriched: 2/28/2026, 6:53:27 AM
Last updated: 4/12/2026, 3:46:31 PM
Views: 22
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.