9.1 CRITICAL
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): HIGH
- User interaction (UI): NONE
- Scope (S): CHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
Frigate Affected by Authenticated Remote Command Execution (RCE) and Container Escape
Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. Prior to 0.16.4, a critical Remote Command Execution (RCE) vulnerability has been identified in the Frigate integration with go2rtc. The application does not sanitize user input in the video stream configuration (config.yaml), allowing direct injection of system commands via the exec: directive. The go2rtc service executes these commands without restrictions. This vulnerability is only exploitable by an administrator or users who have exposed their Frigate install to the open internet with no authentication which allows anyone full administrative control. This vulnerability is fixed in 0.16.4.
References
-
https://github.com/blakeblackshear/frigate/security/advisories/GHSA-4c97-5jmr-8f6x exploitx_refsource_CONFIRM
-
https://github.com/blakeblackshear/frigate/releases/tag/v0.16.4 x_refsource_MISC
Affected products
- ==< 0.16.4
Matching in nixpkgs
pkgs.frigate
NVR with realtime local object detection for IP cameras
pkgs.pkgsRocm.frigate
NVR with realtime local object detection for IP cameras
Package maintainers
-
@mweinelt Martin Weinelt <hexa@darmstadt.ccc.de>
-
@presto8 Preston Hunt <me@prestonhunt.com>