4 results (0.020 seconds)

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. Below 0.13.2 Release, when uploading a file or retrieving the filename, a user may intentionally use a large Unicode filename which would lead to a application-level denial of service. This is due to no limitation set on the length of the filename and the costy use of the Unicode normalization with the form NFKD under the hood of `secure_filename()`. Frigate es un grabador de vídeo en red (NVR) con detección de objetos locales en tiempo real para cámaras IP. Por debajo de la versión 0.13.2, al cargar un archivo o recuperar el nombre del archivo, un usuario puede usar intencionalmente un nombre de archivo Unicode grande, lo que conduciría a una denegación de servicio a nivel de aplicación. • https://github.com/blakeblackshear/frigate/commit/cc851555e4029647986dccc8b8ecf54afee31442 https://github.com/blakeblackshear/frigate/security/advisories/GHSA-w4h6-9wrp-v5jq • CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 7.5EPSS: 6%CPEs: 3EXPL: 1

Frigate is an open source network video recorder. Prior to version 0.13.0 Beta 3, an unsafe deserialization vulnerability was identified in the endpoints used to save configurations for Frigate. This can lead to unauthenticated remote code execution. This can be performed through the UI at `/config` or through a direct call to `/api/config/save`. Exploiting this vulnerability requires the attacker to both know very specific information about a user's Frigate server and requires an authenticated user to be tricked into clicking a specially crafted link to their Frigate instance. • https://github.com/blakeblackshear/frigate/blob/5658e5a4cc7376504af9de5e1eff178939a13e7f/frigate/config.py#L1244-L1244 https://github.com/blakeblackshear/frigate/blob/5658e5a4cc7376504af9de5e1eff178939a13e7f/frigate/http.py#L998-L998 https://github.com/blakeblackshear/frigate/blob/5658e5a4cc7376504af9de5e1eff178939a13e7f/frigate/util/builtin.py#L110-L110 https://github.com/blakeblackshear/frigate/security/advisories/GHSA-qp3h-4q62-p428 https://securitylab.github.com/advisories/GHSL-2023-190_Frigate • CWE-502: Deserialization of Untrusted Data •

CVSS: 4.7EPSS: 1%CPEs: 3EXPL: 1

Frigate is an open source network video recorder. Prior to version 0.13.0 Beta 3, there is a reflected cross-site scripting vulnerability in any API endpoints reliant on the `/<camera_name>` base path as values provided for the path are not sanitized. Exploiting this vulnerability requires the attacker to both know very specific information about a user's Frigate server and requires an authenticated user to be tricked into clicking a specially crafted link to their Frigate instance. This vulnerability could exploited by an attacker under the following circumstances: Frigate publicly exposed to the internet (even with authentication); attacker knows the address of a user's Frigate instance; attacker crafts a specialized page which links to the user's Frigate instance; attacker finds a way to get an authenticated user to visit their specialized page and click the button/link. As the reflected values included in the URL are not sanitized or escaped, this permits execution arbitrary Javascript payloads. • https://github.com/blakeblackshear/frigate/security/advisories/GHSA-jjxc-m35j-p56f https://securitylab.github.com/advisories/GHSL-2023-190_Frigate • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 1

Frigate is an open source network video recorder. Prior to version 0.13.0 Beta 3, the `config/save` and `config/set` endpoints of Frigate do not implement any CSRF protection. This makes it possible for a request sourced from another site to update the configuration of the Frigate server (e.g. via "drive-by" attack). Exploiting this vulnerability requires the attacker to both know very specific information about a user's Frigate server and requires an authenticated user to be tricked into clicking a specially crafted link to their Frigate instance. This vulnerability could exploited by an attacker under the following circumstances: Frigate publicly exposed to the internet (even with authentication); attacker knows the address of a user's Frigate instance; attacker crafts a specialized page which links to the user's Frigate instance; attacker finds a way to get an authenticated user to visit their specialized page and click the button/link. • https://about.gitlab.com/blog/2021/09/07/why-are-developers-vulnerable-to-driveby-attacks https://github.com/blakeblackshear/frigate/blob/5658e5a4cc7376504af9de5e1eff178939a13e7f/frigate/http.py#L1060 https://github.com/blakeblackshear/frigate/blob/6aedc39a9a421cf48000a727f36b4c1495848a1d/frigate/http.py#L998 https://github.com/blakeblackshear/frigate/discussions/8366 https://github.com/blakeblackshear/frigate/security/advisories/GHSA-xq49-hv88-jr6h https://securitylab.github.com/advisories/GHSL-2023-190_Frigate • CWE-352: Cross-Site Request Forgery (CSRF) •