A critical vulnerability, CVE-2024-51482, has been identified in ZoneMinder, an open-source video surveillance platform, posing a high risk to data security with a maximum CVSS score of 10. This vulnerability affects versions v1.37 up to v1.37.64 and can lead to severe consequences, including data exposure and potential system disruptions. The flaw stems from a Boolean-based SQL injection vulnerability in the web/ajax/event.php function, where inadequate validation of the "tagId" parameter permits direct SQL query manipulation. Researchers found that the "tagId" value is directly integrated into SQL commands without proper security checks, making it possible for attackers to exploit this vulnerability through specially crafted requests. For instance, an attacker could send a URL like http://hostname_or_ip/zm/index.php?view=request&request=event&action=removetag&tid=1, injecting SQL code via the "tid" parameter to execute arbitrary SQL commands. This could include dangerous operations such as DELETE statements to delete data or SLEEP commands to induce Denial of Service (DoS) by slowing down the system. To address the issue, ZoneMinder developers released version 1.37.65, which includes a patch that replaces direct SQL calls with parameterized queries and sanitizes input data, effectively preventing SQL injection attacks. Users are strongly advised to update to version 1.37.65 or newer to protect their systems from potential exploitation.
A supply chain attack involving compromised npm packages linked to Namastex Labs has been uncovered, delivering a modified CanisterWorm variant associated with TeamPCP. The campaig...
Windows has become the target of another zero-day attack after a hacker released the proof of concept exploit code on the Internet. Known as BlueHammer, the vulnerability, apparent...
Frances national document agency Agence nationale des titres securises ANTS has confirmed a cybersecurity incident that may have exposed personal data of users on its portal. The b...