motioneye@0.43.1b3 vulnerabilities

motionEye server

Direct Vulnerabilities

Known vulnerabilities in the motioneye package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • C
Command Injection

Affected versions of this package are vulnerable to Command Injection via the add_camera API. An attacker with admin credentials can execute arbitrary commands within a non-interactive shell environment by constructing a malicious device path. This is only exploitable if the attacker has administrative access to the motionEye interface.

How to fix Command Injection?

Upgrade motioneye to version 0.43.1b4 or higher.

[0.43.1b1,0.43.1b4)
  • H
Information Exposure

Affected versions of this package are vulnerable to Information Exposure via a GET request to /config/list. To exploit this vulnerability, a regular user password must be unconfigured.

How to fix Information Exposure?

There is no fixed version for motioneye.

[0,)
  • M
Unrestricted File Upload

Affected versions of this package are vulnerable to Unrestricted File Upload which allows a remote attacker to upload a configuration backup file containing a malicious python pickle file.

Note: The package is no longer being actively maintained. This vulnerability requires admin access rights to be exploitable.

How to fix Unrestricted File Upload?

There is no fixed version for motioneye.

[0,)