Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
motionEye vulnerable to RCE in add_camera Function Due to unsafe command execution
Vulnerability Description
motionEye is an online interface for the software motion, a video surveillance program with motion detection. In versions 0.43.1b1 through 0.43.1b3, using a constructed (camera) device path with the `add`/`add_camera` motionEye web API allows an attacker with motionEye admin user credentials to execute any command within a non-interactive shell as motionEye run user, `motion` by default. The vulnerability has been patched with motionEye v0.43.1b4. As a workaround, apply the patch manually.
CVSS Information
N/A
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Vulnerability Title
motionEye 安全漏洞
Vulnerability Description
motionEye是motionEye开源的一个守护进程的web前端。 motionEye 0.43.1b1版本至0.43.1b3版本存在安全漏洞,该漏洞源于构造设备路径可能导致以motion用户身份执行任意命令。
CVSS Information
N/A
Vulnerability Type
N/A