MotionEye v0.42.1 and below allows attackers to access sensitive information via a GET request to /config/list. To exploit this vulnerability, a regular user password must be unconfigured.
References
Link Resource
https://github.com/ccrisan/motioneye/issues/2292 Issue Tracking Third Party Advisory
https://www.pizzapower.me/2022/02/17/motioneye-config-info-disclosure/ Exploit Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2022-03-24T16:40:20

Updated: 2022-03-24T16:40:20

Reserved: 2022-02-21T00:00:00


Link: CVE-2022-25568

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2022-03-24T17:15:08.410

Modified: 2023-08-08T14:22:24.967


Link: CVE-2022-25568

JSON object: View

cve-icon Redhat Information

No data.

CWE