Описание
Authenticated remote code execution in MotionEye <= 0.42.1 and MotioneEyeOS <= 20200606 allows a remote attacker to upload a configuration backup file containing a malicious python pickle file which will execute arbitrary code on the server.
Ссылки
- Issue TrackingThird Party Advisory
- Third Party Advisory
- Issue TrackingThird Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 0.42.1 (исключая)Версия до 20200606 (исключая)
Одно из
cpe:2.3:a:motioneye_project:motioneye:*:*:*:*:*:*:*:*
cpe:2.3:o:motioneyeos_project:motioneyeos:*:*:*:*:*:*:*:*
EPSS
Процентиль: 94%
0.13636
Средний
7.2 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-306
Связанные уязвимости
CVSS3: 7.2
github
около 4 лет назад
Unrestricted Upload of File with Dangerous Type in motionEye
EPSS
Процентиль: 94%
0.13636
Средний
7.2 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-306