Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-26f6-wm47-7h7j

Опубликовано: 03 окт. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 7.2

Описание

MotionEye v0.43.1b4 and before is vulnerable to OS Command Injection in configuration parameters such as image_file_name. Unsanitized user input is written to Motion configuration files, allowing remote authenticated attackers with admin access to achieve code execution when Motion is restarted.

MotionEye v0.43.1b4 and before is vulnerable to OS Command Injection in configuration parameters such as image_file_name. Unsanitized user input is written to Motion configuration files, allowing remote authenticated attackers with admin access to achieve code execution when Motion is restarted.

EPSS

Процентиль: 95%
0.19086
Средний

7.2 High

CVSS3

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 7.2
nvd
около 1 месяца назад

MotionEye v0.43.1b4 and before is vulnerable to OS Command Injection in configuration parameters such as image_file_name. Unsanitized user input is written to Motion configuration files, allowing remote authenticated attackers with admin access to achieve code execution when Motion is restarted.

EPSS

Процентиль: 95%
0.19086
Средний

7.2 High

CVSS3

Дефекты

CWE-20