MotionEye v0.43.1b4 and before is vulnerable to OS Command Injection in configuration parameters such as image_file_name. Unsanitized user input is written to Motion configuration files, allowing remote authenticated attackers with admin access to achieve code execution when Motion is restarted.
| Software | From | Fixed in |
|---|---|---|
motioneye
|
- | 0.43.1b5 |
| motioneye_project / motioneye | 0.42.1 | 0.42.1.x |
| motioneye_project / motioneye | 0.43.1-beta1 | 0.43.1-beta1.x |
| motioneye_project / motioneye | 0.43.1-beta2 | 0.43.1-beta2.x |
| motioneye_project / motioneye | 0.43.1-beta3 | 0.43.1-beta3.x |
| motioneye_project / motioneye | 0.43.1-beta4 | 0.43.1-beta4.x |