Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-26035 PoC — ZoneMinder 安全漏洞

Source
Associated Vulnerability
Title:ZoneMinder 安全漏洞 (CVE-2023-26035)
Description:ZoneMinder是一套开源的视频监控软件系统。该系统支持IP、USB和模拟摄像机等。 ZoneMinder 1.36.33之前版本和1.37.33之前版本存在安全漏洞,该漏洞源于存在通过缺失授权进行未经认证的远程代码执行的漏洞。
Description
This is a script written in Python that allows the exploitation of the Zoneminder's security flaw described in CVE-2023-26035. 
Readme
# Zoneminder Unauthenticated RCE via Snapshots (CVE-2023-26035) POC

This is a script written in Python that allows the exploitation of the **Zoneminder's** security flaw described in **CVE-2023-26035**. The system is vulnerable in versions preceding **1.36.33** and **1.37.33.**

## Usage

Clone the repository to your machine and install the dependencies using **pip** (it is recommended to use **virtualenv** to create an environment to separate these installations from global installations)

```bash
git clone https://github.com/m3m0o/zoneminder-snapshots-rce-poc
cd zoneminder-snapshots-rce-poc
pip install -r requirements.txt
```

The script needs the **target URL** with the **Zoneminder's** root path (like **http://example.com/zm, http://example.com** or **http://example.com/zoneminder)**, the **IP** or **domain** for the target machine to connect and the **port** for the target machine to connect. Here's an example:

```bash
python3 main.py -u http://zoneminder.target:8000 -i 10.10.14.56 -p 443
```

![script-demo](https://iili.io/Ju3w7t9.gif)

## References

[Unauthenticated RCE in snapshots](https://github.com/ZoneMinder/zoneminder/security/advisories/GHSA-72rg-h4vf-29gr)

[Rapid7 Vulnerability & Exploit Database ZoneMinder Snapshots Command Injection](https://www.rapid7.com/db/modules/exploit/unix/webapp/zoneminder_snapshots/)
File Snapshot

[4.0K] /data/pocs/2c71966667b1358b6e44fc22211024dc1adbb792 ├── [ 11K] LICENSE ├── [1.1K] main.py ├── [1.3K] README.md ├── [ 49] requirements.txt └── [2.4K] zoneminder_snapshots.py 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.