Page 4 of 18 results (0.004 seconds)

CVSS: 8.1EPSS: 97%CPEs: 3EXPL: 7

Embedthis GoAhead before 3.6.5 allows remote code execution if CGI is enabled and a CGI program is dynamically linked. This is a result of initializing the environment of forked CGI scripts using untrusted HTTP request parameters in the cgiHandler function in cgi.c. When combined with the glibc dynamic linker, this behaviour can be abused for remote code execution using special parameter names such as LD_PRELOAD. An attacker can POST their shared object payload in the body of the request, and reference it using /proc/self/fd/0. Embedthis GoAhead en versiones anteriores a la 3.6.5 permite la ejecución remota de código si CGI está habilitado y se enlaza dinámicamente un programa CGI. • https://www.exploit-db.com/exploits/43360 https://www.exploit-db.com/exploits/43877 https://github.com/ivanitlearning/CVE-2017-17562 https://github.com/1337g/CVE-2017-17562 https://github.com/freitzzz/bash-CVE-2017-17562 https://github.com/crispy-peppers/Goahead-CVE-2017-17562 http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.securitytracker.com/id/1040702 https://github.com/elttam/advisories/tree/master/CVE-2017-17562 https://github.com/em •

CVSS: 7.5EPSS: 0%CPEs: 20EXPL: 1

GoAhead 3.4.0 through 3.6.5 has a NULL Pointer Dereference in the websDecodeUrl function in http.c, leading to a crash for a "POST / HTTP/1.1" request. GoAhead en versiones de la 3.4.0 a la 3.6.5 presenta una desreferencia de puntero NULL en la función websDecodeUrl en http.c, lo que da lugar a un bloqueo en una petición "POST / HTTP/1.1". • https://github.com/shadow4u/goaheaddebug/blob/master/README.md • CWE-476: NULL Pointer Dereference •

CVSS: 7.5EPSS: 9%CPEs: 8EXPL: 2

EmbedThis GoAhead 3.0.0 through 3.4.1 does not properly handle path segments starting with a . (dot), which allows remote attackers to conduct directory traversal attacks, cause a denial of service (heap-based buffer overflow and crash), or possibly execute arbitrary code via a crafted URI. EmbedThis GoAhead 3.0.0 hasta 3.4.1 no maneja correctamente los segmentos de rutas que comienzan con un . (punto), lo que permite a atacantes remotos realizar ataques de salto de directorio, causar una denegación de servicio (desbordamiento de buffer basado en memoria dinámica y caída), o posiblemente ejecutar código arbitrario a través de una URI manipulada. GoAhead web server versions 3.0.0 through 3.4.1 suffers from heap overflow and directory traversal vulnerabilities. • http://packetstormsecurity.com/files/131156/GoAhead-3.4.1-Heap-Overflow-Traversal.html http://seclists.org/fulldisclosure/2015/Mar/157 http://www.securityfocus.com/archive/1/535027/100/0/threaded http://www.securitytracker.com/id/1032208 https://github.com/embedthis/goahead/commit/eed4a7d177bf94a54c7b06ccce88507fbd76fb77 https://github.com/embedthis/goahead/issues/106 - • CWE-17: DEPRECATED: Code •