Authenticated Remote Code Execution via Malicious Configuration Backup File in MotionEye

Authenticated Remote Code Execution via Malicious Configuration Backup File in MotionEye

CVE-2021-44255 · HIGH Severity

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Authenticated remote code execution in MotionEye <= 0.42.1 and MotioneEyeOS <= 20200606 allows a remote attacker to upload a configuration backup file containing a malicious python pickle file which will execute arbitrary code on the server.

Learn more about our Cis Benchmark Audit For Server Software.