CVE-2021-42342
https://notcve.org/view.php?id=CVE-2021-42342
An issue was discovered in GoAhead 4.x and 5.x before 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerable CGI scripts. Se ha detectado un problema en GoAhead versiones 4.x y 5.x anteriores a 5.1.5. En el filtro de carga de archivos, las variables de formulario del usuario pueden pasarse a scripts CGI sin que se les anteponga el prefijo CGI. • https://github.com/Mr-xn/CVE-2021-42342 https://github.com/kimusan/goahead-webserver-pre-5.1.5-RCE-PoC-CVE-2021-42342- https://github.com/ijh4723/-zeroboo-Gohead-CVE-2021-42342-1 https://github.com/embedthis/goahead/issues/305 • CWE-434: Unrestricted Upload of File with Dangerous Type •
CVE-2020-15688 – EmbedThis GoAhead Web Server 5.1.1 Digest Authentication Capture Replay Nonce Reuse
https://notcve.org/view.php?id=CVE-2020-15688
The HTTP Digest Authentication in the GoAhead web server before 5.1.2 does not completely protect against replay attacks. This allows an unauthenticated remote attacker to bypass authentication via capture-replay if TLS is not used to protect the underlying communication channel. La autenticación de HTTP Digest en el servidor web de GoAhead versiones anteriores a 5.1.2 no protege completamente contra los ataques de repetición. Esto permite a un atacante remoto no autenticado eludir la autenticación a través de la captura-reproducción si no se utiliza el TLS para proteger el canal de comunicación subyacente A security vulnerability affecting GoAhead versions 2 to 5 has been identified when using Digest authentication over HTTP. The HTTP Digest Authentication in the GoAhead web server does not completely protect against replay attacks. • http://packetstormsecurity.com/files/159505/EmbedThis-GoAhead-Web-Server-5.1.1-Digest-Authentication-Capture-Replay-Nonce-Reuse.html https://github.com/embedthis/goahead-gpl/issues/3 • CWE-294: Authentication Bypass by Capture-replay •
CVE-2019-5096
https://notcve.org/view.php?id=CVE-2019-5096
An exploitable code execution vulnerability exists in the processing of multi-part/form-data requests within the base GoAhead web server application in versions v5.0.1, v.4.1.1 and v3.6.5. A specially crafted HTTP request can lead to a use-after-free condition during the processing of this request that can be used to corrupt heap structures that could lead to full code execution. The request can be unauthenticated in the form of GET or POST requests, and does not require the requested resource to exist on the server. Se presenta una vulnerabilidad de ejecución de código explotable en el procesamiento de peticiones de datos de formulario multiparte dentro de la aplicación base del servidor web GoAhead en versiones v5.0.1, v.4.1.1 y v3.6.5. Una petición HTTP especialmente diseñada puede generar una condición de uso de la memoria previamente liberada del procesamiento de esta petición que puede ser utilizada para corromper las estructuras de la pila lo que podrían conllevar a una ejecución completa del código. • https://github.com/ianxtianxt/CVE-2019-5096-GoAhead-Web-Server-Dos-Exploit https://talosintelligence.com/vulnerability_reports/TALOS-2019-0888 • CWE-416: Use After Free •
CVE-2019-5097
https://notcve.org/view.php?id=CVE-2019-5097
A denial-of-service vulnerability exists in the processing of multi-part/form-data requests in the base GoAhead web server application in versions v5.0.1, v.4.1.1 and v3.6.5. A specially crafted HTTP request can lead to an infinite loop in the process. The request can be unauthenticated in the form of GET or POST requests and does not require the requested resource to exist on the server. Se presenta una vulnerabilidad de denegación de servicio en el procesamiento de peticiones datos de formulario multiparte dentro de la aplicación base del servidor web GoAhead en versiones v5.0.1, v.4.1.1 y v3.6.5. Una petición HTTP especialmente diseñada puede conllevar a un bucle infinito en el proceso. • https://talosintelligence.com/vulnerability_reports/TALOS-2019-0889 • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •
CVE-2019-19240
https://notcve.org/view.php?id=CVE-2019-19240
Embedthis GoAhead before 5.0.1 mishandles redirected HTTP requests with a large Host header. The GoAhead WebsRedirect uses a static host buffer that has a limited length and can overflow. This can cause a copy of the Host header to fail, leaving that buffer uninitialized, which may leak uninitialized data in a response. Incruste GoAhead versiones anteriores a 5.0.1, maneja inapropiadamente las peticiones HTTP redireccionadas con un encabezado Host grande. GoAhead WebsRedirect utiliza un búfer de host estático que posee una longitud limitada y puede desbordarse. • https://github.com/embedthis/goahead/issues/289 https://github.com/embedthis/goahead/issues/290 https://github.com/embedthis/goahead/releases/tag/v5.0.1 • CWE-787: Out-of-bounds Write CWE-908: Use of Uninitialized Resource •