Skip to main content

CVE-2022-31366: n/a in n/a

High
VulnerabilityCVE-2022-31366cvecve-2022-31366
Published: Thu Oct 20 2022 (10/20/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

An arbitrary file upload vulnerability in the apiImportLabs function in api_labs.php of EVE-NG 2.0.3-112 Community allows attackers to execute arbitrary code via a crafted UNL file.

AI-Powered Analysis

AILast updated: 07/05/2025, 06:11:01 UTC

Technical Analysis

CVE-2022-31366 is a high-severity arbitrary file upload vulnerability found in the apiImportLabs function within the api_labs.php file of EVE-NG version 2.0.3-112 Community Edition. EVE-NG (Emulated Virtual Environment Next Generation) is a popular network emulation platform used by network engineers and cybersecurity professionals for designing and testing network topologies. The vulnerability arises because the apiImportLabs function does not properly validate or restrict the types of files uploaded, allowing an attacker to upload a crafted UNL (Universal Network Lab) file that can contain malicious payloads. This arbitrary file upload can lead to remote code execution (RCE), enabling an attacker to execute arbitrary commands on the underlying server hosting the EVE-NG platform. The CVSS v3.1 base score is 7.2, reflecting a high severity level. The vector indicates that the attack can be performed remotely over the network (AV:N) with low attack complexity (AC:L), but requires high privileges (PR:H) and no user interaction (UI:N). The impact affects confidentiality, integrity, and availability (C:H/I:H/A:H), meaning an attacker can fully compromise the system. Although no public exploits are currently known in the wild, the vulnerability is critical for environments running vulnerable versions of EVE-NG, especially since network emulation platforms often have access to sensitive network configurations and credentials. The CWE-434 classification confirms this is an improper restriction on file uploads, a common vector for web application compromise. No official patches or vendor advisories are listed, so users must rely on mitigations or updates from the EVE-NG community or maintainers.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those using EVE-NG in their network design, testing, or cybersecurity training environments. Successful exploitation could allow attackers to gain full control over the emulation server, potentially leading to lateral movement within the corporate network, theft of sensitive network configurations, or disruption of network testing activities. Since EVE-NG environments often simulate critical network infrastructures, compromise could result in exposure of proprietary network designs or credentials. This could further facilitate attacks on production networks. Additionally, the availability impact could disrupt ongoing network testing or training exercises, affecting operational readiness. Given the high privileges required, exploitation is more likely in environments where users have elevated access or where the EVE-NG instance is exposed to untrusted networks. European organizations in sectors such as telecommunications, finance, and critical infrastructure that rely on network emulation for development and security validation are particularly at risk.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first verify if they are running EVE-NG version 2.0.3-112 Community Edition or earlier vulnerable versions. If so, they should immediately restrict access to the EVE-NG management interface to trusted internal networks only, using network segmentation and firewall rules to prevent exposure to untrusted or public networks. Implement strict access controls and ensure that only authorized administrators with necessary privileges can upload lab files. Monitoring and logging upload activities can help detect suspicious attempts. Until an official patch or update is released, consider disabling or restricting the apiImportLabs function if feasible. Employ application-layer firewalls or web application firewalls (WAFs) to detect and block malicious file upload attempts targeting the UNL file format. Regularly audit and update user privileges to minimize the number of users with high privileges (PR:H). Finally, maintain up-to-date backups of the EVE-NG environment to enable recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-05-23T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd8414

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 7/5/2025, 6:11:01 AM

Last updated: 7/31/2025, 8:20:36 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats