Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m2c7-42rf-c62f

Опубликовано: 01 фев. 2022
Источник: github
Github: Прошло ревью
CVSS3: 7.2

Описание

Unrestricted Upload of File with Dangerous Type in motionEye

motionEye <= 0.42.1 and motioneEyeOS <= 20200606 allow a remote attacker to upload a configuration backup file containing a malicious python pickle file. This is possible when an installation is accessible over the Internet and uses no or poor authentication credentials.

The GitHub repositories for motionEye and motionEyeOS are no longer being actively maintained as of January 2022, so release of a patched version is unlikely. Keeping a motionEye or motionEyeOS installation off of the Internet and/or using strong credentials provide protection against this issue.

Пакеты

Наименование

motioneye

pip
Затронутые версииВерсия исправления

<= 0.42.1

Отсутствует

EPSS

Процентиль: 94%
0.13636
Средний

7.2 High

CVSS3

Дефекты

CWE-434

Связанные уязвимости

CVSS3: 7.2
nvd
около 4 лет назад

Authenticated remote code execution in MotionEye <= 0.42.1 and MotioneEyeOS <= 20200606 allows a remote attacker to upload a configuration backup file containing a malicious python pickle file which will execute arbitrary code on the server.

EPSS

Процентиль: 94%
0.13636
Средний

7.2 High

CVSS3

Дефекты

CWE-434