Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-25568

EPSS 85.31% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-25568

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
MotionEye v0.42.1 and below allows attackers to access sensitive information via a GET request to /config/list. To exploit this vulnerability, a regular user password must be unconfigured.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
MotionEye-Project MotionEye 信息泄露漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
MotionEye-Project MotionEye是Calin Crisan个人开发者的一个基于网络的运动前端。 MotionEye-Project MotionEye v0.42.1及其之前版本存在安全漏洞,该漏洞源于应用对于/config/list的GET请求缺少权限限制和过滤。攻击者可以通过取消配置常规用户密码发送GET请求利用该漏洞获取敏感信息。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2022-25568

#POC DescriptionSource LinkShenlong Link
1MotionEye v0.42.1 and below allows attackers to access sensitive information via a GET request to /config/list. To exploit this vulnerability, a regular user password must be unconfigured. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-25568.yamlPOC Details
2Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E5%BC%80%E5%8F%91%E6%A1%86%E6%9E%B6%E6%BC%8F%E6%B4%9E/MotionEye%20%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E7%BB%84%E4%BB%B6%20list%20%E4%BF%A1%E6%81%AF%E6%B3%84%E6%BC%8F%E6%B4%9E%20CVE-2022-25568.mdPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-25568

登录查看更多情报信息。

Same Patch Batch · n/a · 2022-03-24 · 16 CVEs total

CVE-2021-43666ARM mbed TLS 安全漏洞
CVE-2022-27811Red Hat GNOME OCRFeeder 操作系统命令注入漏洞
CVE-2022-27820OWASP Zed Attack Proxy 信任管理问题漏洞
CVE-2021-43700gongwalker ApiManager SQL注入漏洞
CVE-2021-43659Halo 安全漏洞
CVE-2021-39491Yogesh Ojha reNgine 安全漏洞
CVE-2022-26629SoroushPlus Messenger 访问控制错误漏洞
CVE-2021-43084Dreamer CMS 安全漏洞
CVE-2022-25571Bluedon Internet Access Detector 信息泄露漏洞
CVE-2022-26249Survey King 安全漏洞
CVE-2022-26301TuziCMS SQL注入漏洞
CVE-2022-25575Hongmen Intelligent Technology Parking Management System 跨站脚本漏洞
CVE-2022-26272Ionize 安全漏洞
CVE-2022-26279EyouCms 安全漏洞
CVE-2022-25576Anchor 跨站请求伪造漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2022-25568

No comments yet


Leave a comment