Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-44255

EPSS 13.64% · P94
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-44255

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Authenticated remote code execution in MotionEye <= 0.42.1 and MotioneEyeOS <= 20200606 allows a remote attacker to upload a configuration backup file containing a malicious python pickle file which will execute arbitrary code on the server.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
motionEyeOS和MotionEye-Project MotionEye 访问控制错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
motionEyeOS和MotionEye-Project MotionEye都是Calin Crisan个人开发者的产品。motionEyeOS是一种用于单板计算机的视频监控操作系统。MotionEye-Project MotionEye是一个基于网络的运动前端。 MotionEye <= 0.42.1和 motionEyeOS <= 20200606存在访问控制错误漏洞,该漏洞源于经过身份验证的远程代码执行允许远程攻击者可利用该漏洞上传包含恶意python pickle文件的配置备份文件,该文件将在服
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2021-44255

#POC DescriptionSource LinkShenlong Link
1A Python 3 script that uploads a tasks.pickle file that enables RCE in MotionEye. CVE-2021-44255https://github.com/pizza-power/motioneye-authenticated-RCEPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-44255

登录查看更多情报信息。

Same Patch Batch · n/a · 2022-01-31 · 27 CVEs total

CVE-2021-235215.5 MEDIUMLink Following
CVE-2021-235205.5 MEDIUMArbitrary File Write via Archive Extraction (Zip Slip)
CVE-2022-216595.3 MEDIUMObservable Response Discrepancy in Flask-AppBuilder
CVE-2021-46458Victor CMS SQL注入漏洞
CVE-2022-24130Xterm 安全漏洞
CVE-2022-23409Pixel&tonic Craft CMS 路径遍历漏洞
CVE-2021-27971Alpine 安全漏洞
CVE-2021-34805Land Software Faust Iserver 路径遍历漏洞
CVE-2021-45079strongSwan 代码问题漏洞
CVE-2021-46101Git 安全漏洞
CVE-2020-36064Online Course Registration 信任管理问题漏洞
CVE-2020-36056Beetel 777VR1 跨站脚本漏洞
CVE-2021-28962Stormshield Network Security 命令注入漏洞
CVE-2021-31617Stormshield Network Security 缓冲区错误漏洞
CVE-2022-24266Elite Graphix Elite Cms SQL注入漏洞
CVE-2022-0286Linux kernel 代码问题漏洞
CVE-2021-40042Huawei 多款产品缓冲区错误漏洞
CVE-2021-40033HuaWei 多款产品信息泄露漏洞
CVE-2021-44114PHP 跨站脚本漏洞
CVE-2021-42631PrinterLogic Web Stack 代码问题漏洞

Showing top 20 of 27 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2021-44255

No comments yet


Leave a comment