CVE-2021-44255 – motioneye
Package
Manager: pip
Name: motioneye
Vulnerable Version: >=0 <=0.42.1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.14068 pctl0.94104
Details
Unrestricted Upload of File with Dangerous Type in motionEye motionEye <= 0.42.1 and motioneEyeOS <= 20200606 allow a remote attacker to upload a configuration backup file containing a malicious python pickle file. This is possible when an installation is accessible over the Internet and uses no or poor authentication credentials. The GitHub repositories for motionEye and motionEyeOS are no longer being actively maintained as of January 2022, so release of a patched version is unlikely. Keeping a motionEye or motionEyeOS installation off of the Internet and/or using strong credentials provide protection against this issue.
Metadata
Created: 2022-02-01T00:00:44Z
Modified: 2022-02-14T19:58:19Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-m2c7-42rf-c62f/GHSA-m2c7-42rf-c62f.json
CWE IDs: ["CWE-434"]
Alternative ID: GHSA-m2c7-42rf-c62f
Finding: F027
Auto approve: 1