Vulnerability CVE-2021-44255


Published: 2022-01-31

Description:
Authenticated remote code execution in MotionEye <= 0.42.1 and MotioneEyeOS <= 20200606 allows a remote attacker to upload a configuration backup file containing a malicious python pickle file which will execute arbitrary code on the server.

Type:

CWE-434

(Unrestricted Upload of File with Dangerous Type)

CVSS2 => (AV:N/AC:L/Au:S/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.5/10
6.4/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Motioneye project -> Motioneye 
Motioneyeos project -> Motioneyeos 

 References:
https://www.pizzapower.me/2021/10/09/self-hosted-security-part-1-motioneye/
https://github.com/ccrisan/motioneyeos/issues/2843

Copyright 2024, cxsecurity.com

 

Back to Top