CVE-2021-44255

Authenticated remote code execution in MotionEye <= 0.42.1 and MotioneEyeOS <= 20200606 allows a remote attacker to upload a configuration backup file containing a malicious python pickle file which will execute arbitrary code on the server.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:motioneye_project:motioneye:*:*:*:*:*:*:*:*
cpe:2.3:o:motioneyeos_project:motioneyeos:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:30

Type Values Removed Values Added
References () https://github.com/ccrisan/motioneyeos/issues/2843 - Issue Tracking, Third Party Advisory () https://github.com/ccrisan/motioneyeos/issues/2843 - Issue Tracking, Third Party Advisory
References () https://www.pizzapower.me/2021/10/09/self-hosted-security-part-1-motioneye/ - Third Party Advisory () https://www.pizzapower.me/2021/10/09/self-hosted-security-part-1-motioneye/ - Third Party Advisory

Information

Published : 2022-01-31 12:15

Updated : 2024-11-21 06:30


NVD link : CVE-2021-44255

Mitre link : CVE-2021-44255

CVE.ORG link : CVE-2021-44255


JSON object : View

Products Affected

motioneyeos_project

  • motioneyeos

motioneye_project

  • motioneye
CWE
CWE-306

Missing Authentication for Critical Function