ID CVE-2014-9707
Summary EmbedThis GoAhead 3.0.0 through 3.4.1 does not properly handle path segments starting with a . (dot), which allows remote attackers to conduct directory traversal attacks, cause a denial of service (heap-based buffer overflow and crash), or possibly execute arbitrary code via a crafted URI.
References
Vulnerable Configurations
  • EmbedThis GoAhead 3.0.0
    cpe:2.3:a:embedthis:goahead:3.0.0
  • EmbedThis GoAhead 3.3.1
    cpe:2.3:a:embedthis:goahead:3.3.1
  • EmbedThis GoAhead 3.3.2
    cpe:2.3:a:embedthis:goahead:3.3.2
  • EmbedThis GoAhead 3.3.3
    cpe:2.3:a:embedthis:goahead:3.3.3
  • EmbedThis GoAhead 3.3.4
    cpe:2.3:a:embedthis:goahead:3.3.4
  • EmbedThis GoAhead 3.3.5
    cpe:2.3:a:embedthis:goahead:3.3.5
  • EmbedThis GoAhead 3.3.6
    cpe:2.3:a:embedthis:goahead:3.3.6
  • EmbedThis GoAhead 3.4.0
    cpe:2.3:a:embedthis:goahead:3.4.0
CVSS
Base: 7.5 (as of 01-04-2016 - 14:34)
Impact:
Exploitability:
CWE CWE-17
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
metasploit via4
description This module exploits a directory traversal vulnerability in the Embedthis GoAhead Web Server v3.4.1, allowing an attacker to read arbitrary files with the web server privileges.
id MSF:AUXILIARY/SCANNER/HTTP/GOAHEAD_TRAVERSAL
last seen 2019-03-07
modified 2019-03-05
published 2015-04-07
reliability Normal
reporter Rapid7
source https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/goahead_traversal.rb
title Embedthis GoAhead Embedded Web Server Directory Traversal
nessus via4
NASL family Web Servers
NASL id GOAHEAD_CVE_2014_9707.NASL
description The remote GoAhead embedded web server is affected by a directory traversal vulnerability due to a flaw in the websNormalizeUriPath() function. A remote, unauthenticated attacker can exploit this flaw to obtain arbitrary files on the affected host. The flaw that allows the directory traversal may also be used to perform a heap-based buffer overflow, potentially allowing code execution or a denial of service condition.
last seen 2019-02-21
modified 2018-11-15
plugin id 82566
published 2015-04-03
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=82566
title GoAhead Embedded Web Server websNormalizeUriPath() Directory Traversal Vulnerability
packetstorm via4
data source https://packetstormsecurity.com/files/download/131156/goahead341-overflowtraversal.txt
id PACKETSTORM:131156
last seen 2016-12-05
published 2015-03-28
reporter Matthew Daley
source https://packetstormsecurity.com/files/131156/GoAhead-3.4.1-Heap-Overflow-Traversal.html
title GoAhead 3.4.1 Heap Overflow / Traversal
refmap via4
bugtraq 20150328 Advisory: CVE-2014-9707: GoAhead Web Server 3.0.0 - 3.4.1
confirm
fulldisc 20150328 Advisory: CVE-2014-9707: GoAhead Web Server 3.0.0 - 3.4.1
misc http://packetstormsecurity.com/files/131156/GoAhead-3.4.1-Heap-Overflow-Traversal.html
sectrack 1032208
Last major update 01-04-2016 - 14:36
Published 31-03-2015 - 10:59
Last modified 09-10-2018 - 15:55
Back to Top