# N/A
## 漏洞概述
pfSense pfBlockerNG 版本 2.1.4_26 及以下版本存在漏洞,允许远程攻击者通过在 HTTP Host 头中使用 shell 通配符来执行任意操作系统命令,具有 root 权限。
## 影响版本
- pfSense pfBlockerNG 2.1.4_26 及以下版本
## 漏洞细节
攻击者可以通过在 HTTP Host 头中注入 shell 通配符的方式,执行任意操作系统命令,并以 root 权限运行。
## 影响
该漏洞允许攻击者获取系统的完全控制权,可能导致系统受损、数据泄露和未经授权的操作执行。3.x 版本不受此漏洞影响。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | CVE-2022-31814 Exploitation Toolkit. | https://github.com/EvergreenCartoons/SenselessViolence | POC详情 |
2 | None | https://github.com/Madliife0/CVE-2022-31814 | POC详情 |
3 | None | https://github.com/TheUnknownSoul/CVE-2022-31814 | POC详情 |
4 | CVE-2022-31814 | https://github.com/drcayber/RCE | POC详情 |
5 | pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814) | https://github.com/Chocapikk/CVE-2022-31814 | POC详情 |
6 | pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814) | https://github.com/dkstar11q/CVE-2022-31814 | POC详情 |
7 | Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814) | https://github.com/Laburity/CVE-2022-31814 | POC详情 |
8 | This script is a proof-of-concept exploit for pfBlockerNG <= 2.1.4_26 that allows for remote code execution. It takes a single target URL or a list of URLs, tries to upload a shell using multiple payloads, executes a command, and then deletes the shell. | https://github.com/ArunHAtter/CVE-2022-31814 | POC详情 |
9 | Proof of concept for CVE-2022-31814 | https://github.com/Inplex-sys/CVE-2022-31814 | POC详情 |
10 | pfSense pfBlockerNG through 2.1.4_26 is susceptible to OS command injection via root via shell metacharacters in the HTTP Host header. NOTE: 3.x is unaffected. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-31814.yaml | POC详情 |
11 | Proof of concept for CVE-2022-31814 | https://github.com/SystemVll/CVE-2022-31814 | POC详情 |
暂无评论