Description

A critical vulnerability, CVE-2024-51482, has been identified in ZoneMinder, an open-source video surveillance platform, posing a high risk to data security with a maximum CVSS score of 10. This vulnerability affects versions v1.37 up to v1.37.64 and can lead to severe consequences, including data exposure and potential system disruptions. The flaw stems from a Boolean-based SQL injection vulnerability in the web/ajax/event.php function, where inadequate validation of the "tagId" parameter permits direct SQL query manipulation. Researchers found that the "tagId" value is directly integrated into SQL commands without proper security checks, making it possible for attackers to exploit this vulnerability through specially crafted requests. For instance, an attacker could send a URL like http://hostname_or_ip/zm/index.php?view=request&request=event&action=removetag&tid=1, injecting SQL code via the "tid" parameter to execute arbitrary SQL commands. This could include dangerous operations such as DELETE statements to delete data or SLEEP commands to induce Denial of Service (DoS) by slowing down the system. To address the issue, ZoneMinder developers released version 1.37.65, which includes a patch that replaces direct SQL calls with parameterized queries and sanitizes input data, effectively preventing SQL injection attacks. Users are strongly advised to update to version 1.37.65 or newer to protect their systems from potential exploitation.