CVE-2022-25568: MotionEye allows attackers to access sensitive information
(updated )
MotionEye v0.42.1 and below allows attackers to access sensitive information via a GET request to /config/list. To exploit this vulnerability, a regular user password must be unconfigured.
References
- github.com/advisories/GHSA-2c7w-v459-cwgf
- github.com/ccrisan/motioneye/issues/2292
- github.com/motioneye-project/motioneye
- github.com/motioneye-project/motioneye/commit/c60b64af5bb8c09189071522a1f6796cb44340b0
- github.com/pypa/advisory-database/tree/main/vulns/motioneye/PYSEC-2022-43141.yaml
- nvd.nist.gov/vuln/detail/CVE-2022-25568
- www.pizzapower.me/2022/02/17/motioneye-config-info-disclosure
Detect and mitigate CVE-2022-25568 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →