Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-31861: CVE-ZLMediaKit/README.md at main · nbb651/CVE-ZLMediaKit

ZLMediaKit 4.0 is vulnerable to Directory Traversal.

CVE
#vulnerability#web#git#c++

CVE ID:CVE-2023-31861

ZLMediaKit has a Directory Traversal vulnerability

ZLMediaKit is a high-performance operational level streaming service framework based on C++11, widely used in mobile embedded cross platform cameras and other applications.

Github Address:https://github.com/ZLMediaKit/ZLMediaKit

Mapping of cyberspace assets:https://hunter.qianxin.com/list?search=web.title%3D%22%E6%96%87%E4%BB%B6%E7%B4%A2%E5%BC%95%22

As can be seen, many websites have used ZLMediaKit!

After testing, I found that there is a Directory Traversal vulnerability in ZLMediaKit that attackers can use to obtain sensitive user information and do malicious operation, including surveillance camera images.

Vulnerability implementation process:

!!There is sensitive information in the /snap/ and /webrtc/ directory of the website!!

Such as:

1、 http://boluomee.com/readme/ http://boluomee.com/snap/ http://boluomee.com/webrtc/

2、 http://139.224.8.4:28080/readme/ http://139.224.8.4:28080/snap/ http://139.224.8.4:28080/webrtc/

3、 http://139.155.24.130:8091/readme/ http://139.155.24.130:8091/snap/ http://139.155.24.130:8091/webrtc/

4、 http://101.132.75.243:9094/readme/ http://101.132.75.243:9094/snap/ http://101.132.75.243:9094/webrtc/

5、 http://113.16.167.137:3009/readme/ http://113.16.167.137:3009/snap/ http://113.16.167.137:3009/webrtc/

Repair suggestions:

Add access control for directories at all levels and add permission verification code. Users need to log in to access all levels of directories.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda