Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2022-25568 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: MotionEye v0.42.1 and below has an **Information Disclosure** flaw. <br>πŸ“‰ **Consequences**: Attackers can steal sensitive configuration data via a simple GET request to `/config/list`.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: Missing **Access Control** and **Filtering** on the `/config/list` endpoint. <br>πŸ”“ **Flaw**: The application fails to restrict unauthenticated or unauthorized access to this specific API route.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: **MotionEye-Project MotionEye**. <br>πŸ“… **Versions**: v0.42.1 and all previous versions. <br>πŸ‘€ **Developer**: Calin Crisan (Personal Project).

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Hackers' Power**: Access **sensitive information** (likely credentials/configs). <br>πŸ”‘ **Data Type**: Configuration details exposed via the `/config/list` GET request.

Q5Is exploitation threshold high? (Auth/Config)

⚠️ **Threshold**: **Medium/Low**. <br>πŸ”‘ **Condition**: Exploitation requires a **regular user password to be unconfigured** (disabled/empty). If password is set, this specific vector may be blocked.

Q6Is there a public Exp? (PoC/Wild Exploitation)

🌐 **Public Exp?**: **Yes**. <br>πŸ“œ **PoC**: Available via **Nuclei Templates** and **Awesome-POC** repositories on GitHub. Easy to automate.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for the endpoint `/config/list`. <br>πŸ“‘ **Method**: Send a **GET request**. If sensitive data is returned without proper auth, you are vulnerable. Use tools like Nuclei.

Q8Is it fixed officially? (Patch/Mitigation)

πŸ› οΈ **Official Fix**: The data implies the issue is in v0.42.1 and below. <br>βœ… **Action**: Check for **updates** to the latest version from the official GitHub repository (ccrisan/motioneye).

Q9What if no patch? (Workaround)

🚧 **No Patch?**: **Workaround**: Ensure a **strong password is configured** for regular users. <br>πŸ”’ **Mitigation**: Restrict access to `/config/list` via **Firewall/WAF** rules if possible.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **High Priority** (if password is empty). <br>⚑ **Reason**: Easy exploitation via public PoC. If your instance has no password set, patch **IMMEDIATELY**.