All the vulnerabilites related to embedthis - goahead
var-201703-0744
Vulnerability from variot
A command-injection vulnerability exists in a web application on a custom-built GoAhead web server used on Foscam, Vstarcam, and multiple white-label IP camera models. The mail-sending form in the mail.htm page allows an attacker to inject a command into the receiver1 field in the form; it will be executed with root privileges. Foscam is a webcam that can push messages to mobile phones and directly implement video Baidu cloud storage via WIFI. Both Foscam and Vstarcam IP camera are network camera products. Goahead webserver is one of the cross-platform embedded webserver
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201703-0744", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "goahead", "scope": "eq", "trust": 1.6, "vendor": "embedthis", "version": null }, { "model": "goahead", "scope": null, "trust": 0.8, "vendor": "embedthis", "version": null }, { "model": "foscam", "scope": null, "trust": 0.6, "vendor": "foscam", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-03633" }, { "db": "JVNDB", "id": "JVNDB-2017-002234" }, { "db": "CNNVD", "id": "CNNVD-201703-532" }, { "db": "NVD", "id": "CVE-2017-5675" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:embedthis:goahead", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-002234" } ] }, "cve": "CVE-2017-5675", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CVE-2017-5675", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CNVD-2017-03633", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "VHN-113878", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2017-5675", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-5675", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2017-5675", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2017-03633", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201703-532", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-113878", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-03633" }, { "db": "VULHUB", "id": "VHN-113878" }, { "db": "JVNDB", "id": "JVNDB-2017-002234" }, { "db": "CNNVD", "id": "CNNVD-201703-532" }, { "db": "NVD", "id": "CVE-2017-5675" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A command-injection vulnerability exists in a web application on a custom-built GoAhead web server used on Foscam, Vstarcam, and multiple white-label IP camera models. The mail-sending form in the mail.htm page allows an attacker to inject a command into the receiver1 field in the form; it will be executed with root privileges. Foscam is a webcam that can push messages to mobile phones and directly implement video Baidu cloud storage via WIFI. Both Foscam and Vstarcam IP camera are network camera products. Goahead webserver is one of the cross-platform embedded webserver", "sources": [ { "db": "NVD", "id": "CVE-2017-5675" }, { "db": "JVNDB", "id": "JVNDB-2017-002234" }, { "db": "CNVD", "id": "CNVD-2017-03633" }, { "db": "VULHUB", "id": "VHN-113878" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-5675", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2017-002234", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201703-532", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2017-03633", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-113878", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-03633" }, { "db": "VULHUB", "id": "VHN-113878" }, { "db": "JVNDB", "id": "JVNDB-2017-002234" }, { "db": "CNNVD", "id": "CNNVD-201703-532" }, { "db": "NVD", "id": "CVE-2017-5675" } ] }, "id": "VAR-201703-0744", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2017-03633" }, { "db": "VULHUB", "id": "VHN-113878" } ], "trust": 1.7 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-03633" } ] }, "last_update_date": "2024-11-23T22:26:51.647000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://embedthis.com/goahead/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-002234" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-77", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-113878" }, { "db": "JVNDB", "id": "JVNDB-2017-002234" }, { "db": "NVD", "id": "CVE-2017-5675" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "https://www.cybereason.com/cve-ip-cameras/" }, { "trust": 2.5, "url": "https://www.cybereason.com/zero-day-exploits-turn-hundreds-of-thousands-of-ip-cameras-into-iot-botnet-slaves/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5675" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5675" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-03633" }, { "db": "VULHUB", "id": "VHN-113878" }, { "db": "JVNDB", "id": "JVNDB-2017-002234" }, { "db": "CNNVD", "id": "CNNVD-201703-532" }, { "db": "NVD", "id": "CVE-2017-5675" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2017-03633" }, { "db": "VULHUB", "id": "VHN-113878" }, { "db": "JVNDB", "id": "JVNDB-2017-002234" }, { "db": "CNNVD", "id": "CNNVD-201703-532" }, { "db": "NVD", "id": "CVE-2017-5675" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-03-29T00:00:00", "db": "CNVD", "id": "CNVD-2017-03633" }, { "date": "2017-03-13T00:00:00", "db": "VULHUB", "id": "VHN-113878" }, { "date": "2017-04-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-002234" }, { "date": "2017-03-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201703-532" }, { "date": "2017-03-13T06:59:00.417000", "db": "NVD", "id": "CVE-2017-5675" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-03-29T00:00:00", "db": "CNVD", "id": "CNVD-2017-03633" }, { "date": "2017-03-15T00:00:00", "db": "VULHUB", "id": "VHN-113878" }, { "date": "2017-04-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-002234" }, { "date": "2017-03-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201703-532" }, { "date": "2024-11-21T03:28:11.453000", "db": "NVD", "id": "CVE-2017-5675" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201703-532" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Foscam Such as white label IP For custom builds used in camera models GoAhead Web Command injection vulnerability in the server", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-002234" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "command injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-201703-532" } ], "trust": 0.6 } }
var-201703-0743
Vulnerability from variot
A vulnerability in a custom-built GoAhead web server used on Foscam, Vstarcam, and multiple white-label IP camera models allows an attacker to craft a malformed HTTP ("GET system.ini HTTP/1.1\n\n" - note the lack of "/" in the path field of the request) request that will disclose the configuration file with the login password. Foscam is an intelligent network camera that can monitor mobile, voice and temperature, and can push messages to mobile phones. It also has functions such as mobile phone viewing and one-click sharing. Both Foscam and Vstarcam IP camera are network camera products. Goahead webserver is one of the cross-platform embedded webserver. Foscam, Vstarcam and white label IP camera are all IP camera products. Goahead webserver is one of the cross-platform embedded WebServer. There is a security vulnerability in the GoAhead web server used in the Foscam and Vstarcam IP cameras. An attacker can exploit this vulnerability to leak configuration files by sending malicious HTTP requests
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201703-0743", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "goahead", "scope": "eq", "trust": 1.6, "vendor": "embedthis", "version": null }, { "model": "goahead", "scope": null, "trust": 0.8, "vendor": "embedthis", "version": null }, { "model": "foscam", "scope": null, "trust": 0.6, "vendor": "foscam", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-03632" }, { "db": "JVNDB", "id": "JVNDB-2017-002241" }, { "db": "CNNVD", "id": "CNNVD-201703-533" }, { "db": "NVD", "id": "CVE-2017-5674" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:embedthis:goahead", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-002241" } ] }, "cve": "CVE-2017-5674", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2017-5674", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2017-03632", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-113877", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2017-5674", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-5674", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2017-5674", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2017-03632", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201703-533", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-113877", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2017-5674", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-03632" }, { "db": "VULHUB", "id": "VHN-113877" }, { "db": "VULMON", "id": "CVE-2017-5674" }, { "db": "JVNDB", "id": "JVNDB-2017-002241" }, { "db": "CNNVD", "id": "CNNVD-201703-533" }, { "db": "NVD", "id": "CVE-2017-5674" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in a custom-built GoAhead web server used on Foscam, Vstarcam, and multiple white-label IP camera models allows an attacker to craft a malformed HTTP (\"GET system.ini HTTP/1.1\\n\\n\" - note the lack of \"/\" in the path field of the request) request that will disclose the configuration file with the login password. Foscam is an intelligent network camera that can monitor mobile, voice and temperature, and can push messages to mobile phones. It also has functions such as mobile phone viewing and one-click sharing. Both Foscam and Vstarcam IP camera are network camera products. Goahead webserver is one of the cross-platform embedded webserver. Foscam, Vstarcam and white label IP camera are all IP camera products. Goahead webserver is one of the cross-platform embedded WebServer. There is a security vulnerability in the GoAhead web server used in the Foscam and Vstarcam IP cameras. An attacker can exploit this vulnerability to leak configuration files by sending malicious HTTP requests", "sources": [ { "db": "NVD", "id": "CVE-2017-5674" }, { "db": "JVNDB", "id": "JVNDB-2017-002241" }, { "db": "CNVD", "id": "CNVD-2017-03632" }, { "db": "VULHUB", "id": "VHN-113877" }, { "db": "VULMON", "id": "CVE-2017-5674" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-5674", "trust": 3.2 }, { "db": "JVNDB", "id": "JVNDB-2017-002241", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201703-533", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2017-03632", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-113877", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2017-5674", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-03632" }, { "db": "VULHUB", "id": "VHN-113877" }, { "db": "VULMON", "id": "CVE-2017-5674" }, { "db": "JVNDB", "id": "JVNDB-2017-002241" }, { "db": "CNNVD", "id": "CNNVD-201703-533" }, { "db": "NVD", "id": "CVE-2017-5674" } ] }, "id": "VAR-201703-0743", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2017-03632" }, { "db": "VULHUB", "id": "VHN-113877" } ], "trust": 1.7 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-03632" } ] }, "last_update_date": "2024-11-23T23:09:05.300000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://embedthis.com/goahead/" }, { "title": "", "trust": 0.1, "url": "https://github.com/mitchwolfe1/CCTV-GoAhead-Exploit " } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-5674" }, { "db": "JVNDB", "id": "JVNDB-2017-002241" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-113877" }, { "db": "JVNDB", "id": "JVNDB-2017-002241" }, { "db": "NVD", "id": "CVE-2017-5674" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.2, "url": "https://www.cybereason.com/cve-ip-cameras/" }, { "trust": 2.6, "url": "https://www.cybereason.com/zero-day-exploits-turn-hundreds-of-thousands-of-ip-cameras-into-iot-botnet-slaves/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5674" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5674" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/200.html" }, { "trust": 0.1, "url": "https://github.com/mitchwolfe1/cctv-goahead-exploit" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-03632" }, { "db": "VULHUB", "id": "VHN-113877" }, { "db": "VULMON", "id": "CVE-2017-5674" }, { "db": "JVNDB", "id": "JVNDB-2017-002241" }, { "db": "CNNVD", "id": "CNNVD-201703-533" }, { "db": "NVD", "id": "CVE-2017-5674" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2017-03632" }, { "db": "VULHUB", "id": "VHN-113877" }, { "db": "VULMON", "id": "CVE-2017-5674" }, { "db": "JVNDB", "id": "JVNDB-2017-002241" }, { "db": "CNNVD", "id": "CNNVD-201703-533" }, { "db": "NVD", "id": "CVE-2017-5674" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-03-29T00:00:00", "db": "CNVD", "id": "CNVD-2017-03632" }, { "date": "2017-03-13T00:00:00", "db": "VULHUB", "id": "VHN-113877" }, { "date": "2017-03-13T00:00:00", "db": "VULMON", "id": "CVE-2017-5674" }, { "date": "2017-04-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-002241" }, { "date": "2017-03-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201703-533" }, { "date": "2017-03-13T06:59:00.370000", "db": "NVD", "id": "CVE-2017-5674" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-03-29T00:00:00", "db": "CNVD", "id": "CNVD-2017-03632" }, { "date": "2017-03-15T00:00:00", "db": "VULHUB", "id": "VHN-113877" }, { "date": "2017-03-15T00:00:00", "db": "VULMON", "id": "CVE-2017-5674" }, { "date": "2017-04-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-002241" }, { "date": "2017-03-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201703-533" }, { "date": "2024-11-21T03:28:11.270000", "db": "NVD", "id": "CVE-2017-5674" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201703-533" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Foscam Such as white label IP Custom built used by camera models GoAhead Web Vulnerability in server configuration file disclosure", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-002241" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201703-533" } ], "trust": 0.6 } }
var-201808-0471
Vulnerability from variot
An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. An HTTP POST request with a specially crafted "Host" header field may cause a NULL pointer dereference and thus cause a denial of service, as demonstrated by the lack of a trailing ']' character in an IPv6 address. Embedthis GoAhead and Appweb for, NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state. Embedthis GoAhead and Appweb are both products of Embedthis Software in the United States. Embedthis GoAhead is an embedded Web server. Appweb is a fast and small web server, which is mainly used for embedded applications, devices and web services, and supports security defense strategies, digest authentication, virtual hosts, etc. There are security vulnerabilities in Embedthis GoAhead versions prior to 4.0. and Appweb versions prior to 7.0.2
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201808-0471", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "15.1x49" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "15.1x53" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "17.2" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "16.2" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "17.1" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "15.1" }, { "model": "goahead", "scope": "lt", "trust": 1.0, "vendor": "embedthis", "version": "4.0.1" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "12.3" }, { "model": "appweb", "scope": "lt", "trust": 1.0, "vendor": "embedthis", "version": "7.0.2" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "12.3x48" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "17.3" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "17.4" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "18.1" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "16.1" }, { "model": "goahead", "scope": "eq", "trust": 0.8, "vendor": "embedthis", "version": "4.0.1" }, { "model": "appweb", "scope": null, "trust": 0.8, "vendor": "embedthis", "version": null }, { "model": "goahead", "scope": "eq", "trust": 0.6, "vendor": "embedthis", "version": "3.3.4" }, { "model": "goahead", "scope": "eq", "trust": 0.6, "vendor": "embedthis", "version": "3.3.6" }, { "model": "goahead", "scope": "eq", "trust": 0.6, "vendor": "embedthis", "version": "3.3.5" }, { "model": "goahead", "scope": "eq", "trust": 0.6, "vendor": "embedthis", "version": "3.3.3" }, { "model": "goahead", "scope": "eq", "trust": 0.6, "vendor": "embedthis", "version": "3.3.1" }, { "model": "appweb", "scope": "eq", "trust": 0.6, "vendor": "embedthis", "version": "4.6.5" }, { "model": "appweb", "scope": "eq", "trust": 0.6, "vendor": "embedthis", "version": "5.2.0" }, { "model": "appweb", "scope": "eq", "trust": 0.6, "vendor": "embedthis", "version": "5.1.0" }, { "model": "goahead", "scope": "eq", "trust": 0.6, "vendor": "embedthis", "version": "3.0.0" }, { "model": "goahead", "scope": "eq", "trust": 0.6, "vendor": "embedthis", "version": "3.3.2" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-009303" }, { "db": "CNNVD", "id": "CNNVD-201808-525" }, { "db": "NVD", "id": "CVE-2018-15505" } ] }, "cve": "CVE-2018-15505", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2018-15505", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-125771", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2018-15505", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2018-15505", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-15505", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2018-15505", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201808-525", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-125771", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-125771" }, { "db": "JVNDB", "id": "JVNDB-2018-009303" }, { "db": "CNNVD", "id": "CNNVD-201808-525" }, { "db": "NVD", "id": "CVE-2018-15505" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. An HTTP POST request with a specially crafted \"Host\" header field may cause a NULL pointer dereference and thus cause a denial of service, as demonstrated by the lack of a trailing \u0027]\u0027 character in an IPv6 address. Embedthis GoAhead and Appweb for, NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state. Embedthis GoAhead and Appweb are both products of Embedthis Software in the United States. Embedthis GoAhead is an embedded Web server. Appweb is a fast and small web server, which is mainly used for embedded applications, devices and web services, and supports security defense strategies, digest authentication, virtual hosts, etc. There are security vulnerabilities in Embedthis GoAhead versions prior to 4.0. and Appweb versions prior to 7.0.2", "sources": [ { "db": "NVD", "id": "CVE-2018-15505" }, { "db": "JVNDB", "id": "JVNDB-2018-009303" }, { "db": "VULHUB", "id": "VHN-125771" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-15505", "trust": 3.3 }, { "db": "JVN", "id": "JVNVU92569237", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2018-009303", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201808-525", "trust": 0.7 }, { "db": "JUNIPER", "id": "JSA10948", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.2562", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-125771", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-125771" }, { "db": "JVNDB", "id": "JVNDB-2018-009303" }, { "db": "CNNVD", "id": "CNNVD-201808-525" }, { "db": "NVD", "id": "CVE-2018-15505" } ] }, "id": "VAR-201808-0471", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-125771" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T20:32:59.811000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "NULL\u00a0dereference\u00a0for\u00a0invalid\u00a0Host\u00a0and\u00a0If-Modified-*\u00a0headers\u00a0#605 GitHub", "trust": 0.8, "url": "https://github.com/embedthis/appweb/commit/16e6979c82297d5fc4f8661e7ada975f51e4dfa9" }, { "title": "Embedthis GoAhead and Appweb Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=84128" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-009303" }, { "db": "CNNVD", "id": "CNNVD-201808-525" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-125771" }, { "db": "JVNDB", "id": "JVNDB-2018-009303" }, { "db": "NVD", "id": "CVE-2018-15505" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://github.com/embedthis/appweb/commit/16e6979c82297d5fc4f8661e7ada975f51e4dfa9" }, { "trust": 1.7, "url": "https://github.com/embedthis/appweb/issues/605" }, { "trust": 1.7, "url": "https://github.com/embedthis/goahead/issues/264" }, { "trust": 1.6, "url": "https://supportportal.juniper.net/s/article/2021-07-security-bulletin-junos-os-multiple-j-web-vulnerabilities-resolved?language=en_us" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu92569237/index.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-15505" }, { "trust": 0.6, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10948" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/embedthis-goahead-appweb-null-pointer-dereference-via-host-header-29747" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.2562/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-125771" }, { "db": "JVNDB", "id": "JVNDB-2018-009303" }, { "db": "CNNVD", "id": "CNNVD-201808-525" }, { "db": "NVD", "id": "CVE-2018-15505" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-125771" }, { "db": "JVNDB", "id": "JVNDB-2018-009303" }, { "db": "CNNVD", "id": "CNNVD-201808-525" }, { "db": "NVD", "id": "CVE-2018-15505" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-08-18T00:00:00", "db": "VULHUB", "id": "VHN-125771" }, { "date": "2018-11-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-009303" }, { "date": "2018-08-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201808-525" }, { "date": "2018-08-18T03:29:00.457000", "db": "NVD", "id": "CVE-2018-15505" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-19T00:00:00", "db": "VULHUB", "id": "VHN-125771" }, { "date": "2023-05-11T08:50:00", "db": "JVNDB", "id": "JVNDB-2018-009303" }, { "date": "2023-06-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201808-525" }, { "date": "2024-11-21T03:50:57.637000", "db": "NVD", "id": "CVE-2018-15505" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201808-525" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Embedthis\u00a0GoAhead\u00a0 and \u00a0Appweb\u00a0 In \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-009303" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201808-525" } ], "trust": 0.6 } }
var-201709-0320
Vulnerability from variot
GoAhead 3.4.0 through 3.6.5 has a NULL Pointer Dereference in the websDecodeUrl function in http.c, leading to a crash for a "POST / HTTP/1.1" request. GoAhead is a small and exquisite embedded Web server of American Embedthis Company, which supports embedding in various devices and applications. There is a security vulnerability in the 'websDecodeUrl' function of the http.c file in GoAhead versions 3.4.0 to 3.6.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201709-0320", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "goahead", "scope": "eq", "trust": 1.6, "vendor": "embedthis", "version": "3.6.2" }, { "model": "goahead", "scope": "eq", "trust": 1.6, "vendor": "embedthis", "version": "3.4.0" }, { "model": "goahead", "scope": "eq", "trust": 1.6, "vendor": "embedthis", "version": "3.6.0" }, { "model": "goahead", "scope": "eq", "trust": 1.6, "vendor": "embedthis", "version": "3.6.4" }, { "model": "goahead", "scope": "eq", "trust": 1.6, "vendor": "embedthis", "version": "3.4.1" }, { "model": "goahead", "scope": "eq", "trust": 1.6, "vendor": "embedthis", "version": "3.6.5" }, { "model": "goahead", "scope": "eq", "trust": 1.6, "vendor": "embedthis", "version": "3.5.0" }, { "model": "goahead", "scope": "eq", "trust": 1.6, "vendor": "embedthis", "version": "3.4.2" }, { "model": "goahead", "scope": "eq", "trust": 1.6, "vendor": "embedthis", "version": "3.6.1" }, { "model": "goahead", "scope": "eq", "trust": 1.6, "vendor": "embedthis", "version": "3.6.3" }, { "model": "goahead", "scope": "eq", "trust": 1.0, "vendor": "embedthis", "version": "3.4.6" }, { "model": "goahead", "scope": "eq", "trust": 1.0, "vendor": "embedthis", "version": "3.4.3" }, { "model": "goahead", "scope": "eq", "trust": 1.0, "vendor": "embedthis", "version": "3.4.12" }, { "model": "goahead", "scope": "eq", "trust": 1.0, "vendor": "embedthis", "version": "3.4.11" }, { "model": "goahead", "scope": "eq", "trust": 1.0, "vendor": "embedthis", "version": "3.4.10" }, { "model": "goahead", "scope": "eq", "trust": 1.0, "vendor": "embedthis", "version": "3.4.5" }, { "model": "goahead", "scope": "eq", "trust": 1.0, "vendor": "embedthis", "version": "3.4.7" }, { "model": "goahead", "scope": "eq", "trust": 1.0, "vendor": "embedthis", "version": "3.4.8" }, { "model": "goahead", "scope": "eq", "trust": 1.0, "vendor": "embedthis", "version": "3.4.9" }, { "model": "goahead", "scope": "eq", "trust": 1.0, "vendor": "embedthis", "version": "3.4.4" }, { "model": "goahead", "scope": "eq", "trust": 0.8, "vendor": "embedthis", "version": "3.4.0 to 3.6.5" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-007554" }, { "db": "CNNVD", "id": "CNNVD-201709-126" }, { "db": "NVD", "id": "CVE-2017-14149" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:embedthis:goahead", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-007554" } ] }, "cve": "CVE-2017-14149", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2017-14149", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-104842", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2017-14149", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-14149", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2017-14149", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201709-126", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-104842", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-104842" }, { "db": "JVNDB", "id": "JVNDB-2017-007554" }, { "db": "CNNVD", "id": "CNNVD-201709-126" }, { "db": "NVD", "id": "CVE-2017-14149" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "GoAhead 3.4.0 through 3.6.5 has a NULL Pointer Dereference in the websDecodeUrl function in http.c, leading to a crash for a \"POST / HTTP/1.1\" request. GoAhead is a small and exquisite embedded Web server of American Embedthis Company, which supports embedding in various devices and applications. There is a security vulnerability in the \u0027websDecodeUrl\u0027 function of the http.c file in GoAhead versions 3.4.0 to 3.6.5", "sources": [ { "db": "NVD", "id": "CVE-2017-14149" }, { "db": "JVNDB", "id": "JVNDB-2017-007554" }, { "db": "VULHUB", "id": "VHN-104842" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-14149", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2017-007554", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201709-126", "trust": 0.7 }, { "db": "NSFOCUS", "id": "37547", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-104842", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-104842" }, { "db": "JVNDB", "id": "JVNDB-2017-007554" }, { "db": "CNNVD", "id": "CNNVD-201709-126" }, { "db": "NVD", "id": "CVE-2017-14149" } ] }, "id": "VAR-201709-0320", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-104842" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T23:02:21.979000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://embedthis.com/goahead/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-007554" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-104842" }, { "db": "JVNDB", "id": "JVNDB-2017-007554" }, { "db": "NVD", "id": "CVE-2017-14149" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://github.com/shadow4u/goaheaddebug/blob/master/readme.md" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-14149" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-14149" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/37547" } ], "sources": [ { "db": "VULHUB", "id": "VHN-104842" }, { "db": "JVNDB", "id": "JVNDB-2017-007554" }, { "db": "CNNVD", "id": "CNNVD-201709-126" }, { "db": "NVD", "id": "CVE-2017-14149" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-104842" }, { "db": "JVNDB", "id": "JVNDB-2017-007554" }, { "db": "CNNVD", "id": "CNNVD-201709-126" }, { "db": "NVD", "id": "CVE-2017-14149" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-09-05T00:00:00", "db": "VULHUB", "id": "VHN-104842" }, { "date": "2017-09-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-007554" }, { "date": "2017-09-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201709-126" }, { "date": "2017-09-05T07:29:00.273000", "db": "NVD", "id": "CVE-2017-14149" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-09-05T00:00:00", "db": "VULHUB", "id": "VHN-104842" }, { "date": "2017-09-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-007554" }, { "date": "2017-09-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201709-126" }, { "date": "2024-11-21T03:12:14.447000", "db": "NVD", "id": "CVE-2017-14149" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201709-126" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "GoAhead In NULL Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-007554" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-201709-126" } ], "trust": 0.6 } }
var-201906-0501
Vulnerability from variot
In http.c in Embedthis GoAhead before 4.1.1 and 5.x before 5.0.1, a header parsing vulnerability causes a memory assertion, out-of-bounds memory reference, and potential DoS, as demonstrated by a colon on a line by itself. Embedthis GoAhead Exists in a buffer error vulnerability.Service operation interruption (DoS) It may be in a state. EmbedthisSoftwareGoAhead is an embedded web server from EmbedthisSoftware, USA. A buffer overflow vulnerability exists in the http.c file in versions of EmbedthisGoAhead4.1.1 and 5.x prior to 5.0.1. The vulnerability stems from a network system or product that does not properly validate data boundaries when performing operations on memory, causing erroneous read and write operations to be performed on other associated memory locations. An attacker could exploit the vulnerability to cause a buffer overflow or heap overflow
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201906-0501", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "goahead", "scope": "lt", "trust": 1.0, "vendor": "embedthis", "version": "5.0.1" }, { "model": "goahead", "scope": "gte", "trust": 1.0, "vendor": "embedthis", "version": "5.0.0" }, { "model": "goahead", "scope": "lt", "trust": 1.0, "vendor": "embedthis", "version": "4.1.1" }, { "model": "goahead", "scope": "eq", "trust": 0.8, "vendor": "embedthis", "version": "4.1.1" }, { "model": "goahead", "scope": "eq", "trust": 0.8, "vendor": "embedthis", "version": null }, { "model": "goahead", "scope": "lt", "trust": 0.8, "vendor": "embedthis", "version": "5.x" }, { "model": "goahead", "scope": "eq", "trust": 0.8, "vendor": "embedthis", "version": "5.0.1" }, { "model": "software embedthis software goahead", "scope": "lt", "trust": 0.6, "vendor": "embedthis", "version": "4.1.1" }, { "model": "software embedthis software goahead", "scope": "eq", "trust": 0.6, "vendor": "embedthis", "version": "5.*\u003c5.0.1" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-19301" }, { "db": "JVNDB", "id": "JVNDB-2019-005500" }, { "db": "NVD", "id": "CVE-2019-12822" } ] }, "cve": "CVE-2019-12822", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2019-12822", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2019-19301", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-144607", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2019-12822", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-12822", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2019-12822", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2019-19301", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201906-610", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-144607", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-19301" }, { "db": "VULHUB", "id": "VHN-144607" }, { "db": "JVNDB", "id": "JVNDB-2019-005500" }, { "db": "CNNVD", "id": "CNNVD-201906-610" }, { "db": "NVD", "id": "CVE-2019-12822" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In http.c in Embedthis GoAhead before 4.1.1 and 5.x before 5.0.1, a header parsing vulnerability causes a memory assertion, out-of-bounds memory reference, and potential DoS, as demonstrated by a colon on a line by itself. Embedthis GoAhead Exists in a buffer error vulnerability.Service operation interruption (DoS) It may be in a state. EmbedthisSoftwareGoAhead is an embedded web server from EmbedthisSoftware, USA. A buffer overflow vulnerability exists in the http.c file in versions of EmbedthisGoAhead4.1.1 and 5.x prior to 5.0.1. The vulnerability stems from a network system or product that does not properly validate data boundaries when performing operations on memory, causing erroneous read and write operations to be performed on other associated memory locations. An attacker could exploit the vulnerability to cause a buffer overflow or heap overflow", "sources": [ { "db": "NVD", "id": "CVE-2019-12822" }, { "db": "JVNDB", "id": "JVNDB-2019-005500" }, { "db": "CNVD", "id": "CNVD-2019-19301" }, { "db": "VULHUB", "id": "VHN-144607" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-12822", "trust": 3.9 }, { "db": "JVN", "id": "JVNVU92569237", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-005500", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201906-610", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2019-19301", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-144607", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-19301" }, { "db": "VULHUB", "id": "VHN-144607" }, { "db": "JVNDB", "id": "JVNDB-2019-005500" }, { "db": "CNNVD", "id": "CNNVD-201906-610" }, { "db": "NVD", "id": "CVE-2019-12822" } ] }, "id": "VAR-201906-0501", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2019-19301" }, { "db": "VULHUB", "id": "VHN-144607" } ], "trust": 1.7 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-19301" } ] }, "last_update_date": "2024-11-23T20:22:49.009000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Comparing\u00a0changes GitHub", "trust": 0.8, "url": "https://github.com/embedthis/goahead/compare/5349710...579f21f" }, { "title": "EmbedthisGoAhead Buffer Overflow Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/165345" }, { "title": "Embedthis GoAhead Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93827" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-19301" }, { "db": "JVNDB", "id": "JVNDB-2019-005500" }, { "db": "CNNVD", "id": "CNNVD-201906-610" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "CWE-917", "trust": 1.0 }, { "problemtype": "Buffer error (CWE-119) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-144607" }, { "db": "JVNDB", "id": "JVNDB-2019-005500" }, { "db": "NVD", "id": "CVE-2019-12822" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-12822" }, { "trust": 1.7, "url": "https://github.com/embedthis/goahead/compare/5349710...579f21f" }, { "trust": 1.7, "url": "https://github.com/embedthis/goahead/issues/285" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu92569237/index.html" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-19301" }, { "db": "VULHUB", "id": "VHN-144607" }, { "db": "JVNDB", "id": "JVNDB-2019-005500" }, { "db": "CNNVD", "id": "CNNVD-201906-610" }, { "db": "NVD", "id": "CVE-2019-12822" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2019-19301" }, { "db": "VULHUB", "id": "VHN-144607" }, { "db": "JVNDB", "id": "JVNDB-2019-005500" }, { "db": "CNNVD", "id": "CNNVD-201906-610" }, { "db": "NVD", "id": "CVE-2019-12822" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-26T00:00:00", "db": "CNVD", "id": "CNVD-2019-19301" }, { "date": "2019-06-14T00:00:00", "db": "VULHUB", "id": "VHN-144607" }, { "date": "2019-06-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-005500" }, { "date": "2019-06-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-610" }, { "date": "2019-06-14T14:29:00.843000", "db": "NVD", "id": "CVE-2019-12822" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-06-26T00:00:00", "db": "CNVD", "id": "CNVD-2019-19301" }, { "date": "2019-06-17T00:00:00", "db": "VULHUB", "id": "VHN-144607" }, { "date": "2023-05-11T08:50:00", "db": "JVNDB", "id": "JVNDB-2019-005500" }, { "date": "2019-06-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201906-610" }, { "date": "2024-11-21T04:23:39.470000", "db": "NVD", "id": "CVE-2019-12822" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-610" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Embedthis\u00a0GoAhead\u00a0 Buffer error vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-005500" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201906-610" } ], "trust": 0.6 } }
var-202201-1821
Vulnerability from variot
The code that performs password matching when using 'Basic' HTTP authentication does not use a constant-time memcmp and has no rate-limiting. This means that an unauthenticated network attacker can brute-force the HTTP basic password, byte-by-byte, by recording the webserver's response time until the unauthorized (401) response. GoAhead Is vulnerable to improper restrictions on excessive authentication attempts.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Embedthis Software GoAhead is an open source small embedded Web server from Embedthis Software in the United States
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1821", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "goahead", "scope": "lt", "trust": 1.0, "vendor": "embedthis", "version": "5.1.4" }, { "model": "goahead", "scope": "eq", "trust": 0.8, "vendor": "embedthis", "version": null }, { "model": "goahead", "scope": null, "trust": 0.8, "vendor": "embedthis", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-004217" }, { "db": "NVD", "id": "CVE-2021-43298" } ] }, "cve": "CVE-2021-43298", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-43298", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-404338", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-43298", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-43298", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-43298", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-43298", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202201-2335", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-404338", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-404338" }, { "db": "JVNDB", "id": "JVNDB-2022-004217" }, { "db": "CNNVD", "id": "CNNVD-202201-2335" }, { "db": "NVD", "id": "CVE-2021-43298" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The code that performs password matching when using \u0027Basic\u0027 HTTP authentication does not use a constant-time memcmp and has no rate-limiting. This means that an unauthenticated network attacker can brute-force the HTTP basic password, byte-by-byte, by recording the webserver\u0027s response time until the unauthorized (401) response. GoAhead Is vulnerable to improper restrictions on excessive authentication attempts.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Embedthis Software GoAhead is an open source small embedded Web server from Embedthis Software in the United States", "sources": [ { "db": "NVD", "id": "CVE-2021-43298" }, { "db": "JVNDB", "id": "JVNDB-2022-004217" }, { "db": "VULHUB", "id": "VHN-404338" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-43298", "trust": 3.3 }, { "db": "JVN", "id": "JVNVU92569237", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2022-004217", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-2335", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-404338", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-404338" }, { "db": "JVNDB", "id": "JVNDB-2022-004217" }, { "db": "CNNVD", "id": "CNNVD-202201-2335" }, { "db": "NVD", "id": "CVE-2021-43298" } ] }, "id": "VAR-202201-1821", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-404338" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T20:13:50.174000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top\u00a0Page", "trust": 0.8, "url": "https://www.embedthis.com/" }, { "title": "Embedthis Software GoAhead Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=180331" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-004217" }, { "db": "CNNVD", "id": "CNNVD-202201-2335" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-307", "trust": 1.1 }, { "problemtype": "CWE-208", "trust": 1.0 }, { "problemtype": "Inappropriate limitation of excessive authentication attempts (CWE-307) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-404338" }, { "db": "JVNDB", "id": "JVNDB-2022-004217" }, { "db": "NVD", "id": "CVE-2021-43298" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://github.com/embedthis/goahead/issues/304" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-43298" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu92569237/index.html" } ], "sources": [ { "db": "VULHUB", "id": "VHN-404338" }, { "db": "JVNDB", "id": "JVNDB-2022-004217" }, { "db": "CNNVD", "id": "CNNVD-202201-2335" }, { "db": "NVD", "id": "CVE-2021-43298" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-404338" }, { "db": "JVNDB", "id": "JVNDB-2022-004217" }, { "db": "CNNVD", "id": "CNNVD-202201-2335" }, { "db": "NVD", "id": "CVE-2021-43298" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-25T00:00:00", "db": "VULHUB", "id": "VHN-404338" }, { "date": "2023-03-31T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-004217" }, { "date": "2022-01-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-2335" }, { "date": "2022-01-25T20:15:08.510000", "db": "NVD", "id": "CVE-2021-43298" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-01T00:00:00", "db": "VULHUB", "id": "VHN-404338" }, { "date": "2023-05-11T08:45:00", "db": "JVNDB", "id": "JVNDB-2022-004217" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-2335" }, { "date": "2024-11-21T06:29:01.873000", "db": "NVD", "id": "CVE-2021-43298" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-2335" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "GoAhead\u00a0 Vulnerability in improperly limiting excessive authentication attempts in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-004217" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-2335" } ], "trust": 0.6 } }
var-201801-0296
Vulnerability from variot
EmbedThis GoAhead Webserver version 4.0.0 is vulnerable to a NULL pointer dereference in the CGI handler resulting in memory corruption or denial of service. Embedthis Goahead Webserver is a small and exquisite embedded Web server of American Embedthis Software Company, which supports embedding in various devices and applications. CGI handler is one of the CGI handlers
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201801-0296", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "goahead", "scope": "eq", "trust": 2.4, "vendor": "embedthis", "version": "4.0.0" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-011857" }, { "db": "CNNVD", "id": "CNNVD-201801-117" }, { "db": "NVD", "id": "CVE-2017-1000471" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:embedthis:goahead", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-011857" } ] }, "cve": "CVE-2017-1000471", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2017-1000471", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-100200", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2017-1000471", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-1000471", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2017-1000471", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-201801-117", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-100200", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-100200" }, { "db": "JVNDB", "id": "JVNDB-2017-011857" }, { "db": "CNNVD", "id": "CNNVD-201801-117" }, { "db": "NVD", "id": "CVE-2017-1000471" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EmbedThis GoAhead Webserver version 4.0.0 is vulnerable to a NULL pointer dereference in the CGI handler resulting in memory corruption or denial of service. Embedthis Goahead Webserver is a small and exquisite embedded Web server of American Embedthis Software Company, which supports embedding in various devices and applications. CGI handler is one of the CGI handlers", "sources": [ { "db": "NVD", "id": "CVE-2017-1000471" }, { "db": "JVNDB", "id": "JVNDB-2017-011857" }, { "db": "VULHUB", "id": "VHN-100200" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-1000471", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2017-011857", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201801-117", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-100200", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-100200" }, { "db": "JVNDB", "id": "JVNDB-2017-011857" }, { "db": "CNNVD", "id": "CNNVD-201801-117" }, { "db": "NVD", "id": "CVE-2017-1000471" } ] }, "id": "VAR-201801-0296", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-100200" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:26:34.123000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Fix a null pointer dereference, if initial walloc() fails or wrealloc () fails", "trust": 0.8, "url": "https://github.com/embedthis/goahead/commit/5e6be61e42448f503e75e287dc332b1ecbf2a665#diff-7c9c60c790648b06210f57b9e2f53ca7" }, { "title": "Fix null pointer dereferences and add integer overflow check #258", "trust": 0.8, "url": "https://github.com/embedthis/goahead/pull/258" }, { "title": "EmbedThis GoAhead Webserver CGI handler Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=77441" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-011857" }, { "db": "CNNVD", "id": "CNNVD-201801-117" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-100200" }, { "db": "JVNDB", "id": "JVNDB-2017-011857" }, { "db": "NVD", "id": "CVE-2017-1000471" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://github.com/embedthis/goahead/commit/5e6be61e42448f503e75e287dc332b1ecbf2a665#diff-7c9c60c790648b06210f57b9e2f53ca7" }, { "trust": 1.7, "url": "https://github.com/embedthis/goahead/pull/258" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-1000471" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-1000471" } ], "sources": [ { "db": "VULHUB", "id": "VHN-100200" }, { "db": "JVNDB", "id": "JVNDB-2017-011857" }, { "db": "CNNVD", "id": "CNNVD-201801-117" }, { "db": "NVD", "id": "CVE-2017-1000471" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-100200" }, { "db": "JVNDB", "id": "JVNDB-2017-011857" }, { "db": "CNNVD", "id": "CNNVD-201801-117" }, { "db": "NVD", "id": "CVE-2017-1000471" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-01-03T00:00:00", "db": "VULHUB", "id": "VHN-100200" }, { "date": "2018-02-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-011857" }, { "date": "2018-01-04T00:00:00", "db": "CNNVD", "id": "CNNVD-201801-117" }, { "date": "2018-01-03T20:29:00.453000", "db": "NVD", "id": "CVE-2017-1000471" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-01-17T00:00:00", "db": "VULHUB", "id": "VHN-100200" }, { "date": "2018-02-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-011857" }, { "date": "2018-01-04T00:00:00", "db": "CNNVD", "id": "CNNVD-201801-117" }, { "date": "2024-11-21T03:04:48.260000", "db": "NVD", "id": "CVE-2017-1000471" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201801-117" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EmbedThis GoAhead Webserver In NULL Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-011857" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-201801-117" } ], "trust": 0.6 } }
var-202007-0690
Vulnerability from variot
The HTTP Digest Authentication in the GoAhead web server before 5.1.2 does not completely protect against replay attacks. This allows an unauthenticated remote attacker to bypass authentication via capture-replay if TLS is not used to protect the underlying communication channel. GoAhead for, Capture-replay An authentication bypass vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. GoAhead is the world's most popular, tiny embedded web server. It is compact, secure and simple to use. GoAhead is deployed in hundreds of millions of devices and is ideal for the smallest of embedded devices.A security vulnerability affecting GoAhead versions 2 to 5 has been identified when using Digest authentication over HTTP. GoAhead versions 3 to 5 validated the nonce with a fixed duration of 5 minutes which permitted short-period replays. This duration is too long for most implementations.Tested on: GoAhead-httpGoAhead-Webs. There is a security vulnerability in Embedthis Software GoAhead versions before 5.1.2. An attacker could exploit this vulnerability to bypass authentication
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202007-0690", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "goahead", "scope": "lt", "trust": 1.0, "vendor": "embedthis", "version": "5.1.2" }, { "model": "goahead", "scope": "eq", "trust": 0.8, "vendor": "embedthis", "version": null }, { "model": "goahead", "scope": "eq", "trust": 0.8, "vendor": "embedthis", "version": "5.1.2" }, { "model": "goahead web server", "scope": "lt", "trust": 0.1, "vendor": "embedthis", "version": "\u0026lt;=5.1.1 and \u0026lt;=4.1.2" } ], "sources": [ { "db": "ZSL", "id": "ZSL-2020-5598" }, { "db": "JVNDB", "id": "JVNDB-2020-008671" }, { "db": "NVD", "id": "CVE-2020-15688" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "LiquidWorm", "sources": [ { "db": "CNNVD", "id": "CNNVD-202007-1390" } ], "trust": 0.6 }, "cve": "CVE-2020-15688", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2020-15688", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-168691", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2020-15688", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2020-15688", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-15688", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2020-15688", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202007-1390", "trust": 0.6, "value": "HIGH" }, { "author": "ZSL", "id": "ZSL-2020-5598", "trust": 0.1, "value": "(3/5)" }, { "author": "VULHUB", "id": "VHN-168691", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "ZSL", "id": "ZSL-2020-5598" }, { "db": "VULHUB", "id": "VHN-168691" }, { "db": "JVNDB", "id": "JVNDB-2020-008671" }, { "db": "CNNVD", "id": "CNNVD-202007-1390" }, { "db": "NVD", "id": "CVE-2020-15688" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The HTTP Digest Authentication in the GoAhead web server before 5.1.2 does not completely protect against replay attacks. This allows an unauthenticated remote attacker to bypass authentication via capture-replay if TLS is not used to protect the underlying communication channel. GoAhead for, Capture-replay An authentication bypass vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. GoAhead is the world\u0027s most popular, tiny embedded web server. It is compact, secure and simple to use. GoAhead is deployed in hundreds of millions of devices and is ideal for the smallest of embedded devices.A security vulnerability affecting GoAhead versions 2 to 5 has been identified when using Digest authentication over HTTP. GoAhead versions 3 to 5 validated the nonce with a fixed duration of 5 minutes which permitted short-period replays. This duration is too long for most implementations.Tested on: GoAhead-httpGoAhead-Webs. There is a security vulnerability in Embedthis Software GoAhead versions before 5.1.2. An attacker could exploit this vulnerability to bypass authentication", "sources": [ { "db": "NVD", "id": "CVE-2020-15688" }, { "db": "JVNDB", "id": "JVNDB-2020-008671" }, { "db": "ZSL", "id": "ZSL-2020-5598" }, { "db": "VULHUB", "id": "VHN-168691" } ], "trust": 1.8 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.zeroscience.mk/codes/goahead_noncereplay.txt", "trust": 0.1, "type": "poc" } ], "sources": [ { "db": "ZSL", "id": "ZSL-2020-5598" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-15688", "trust": 3.4 }, { "db": "PACKETSTORM", "id": "159505", "trust": 1.8 }, { "db": "JVN", "id": "JVNVU92569237", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-008671", "trust": 0.8 }, { "db": "CXSECURITY", "id": "WLB-2020100044", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202007-1390", "trust": 0.7 }, { "db": "EXPLOIT-DB", "id": "48958", "trust": 0.1 }, { "db": "ZSL", "id": "ZSL-2020-5598", "trust": 0.1 }, { "db": "CNVD", "id": "CNVD-2020-46563", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-168691", "trust": 0.1 } ], "sources": [ { "db": "ZSL", "id": "ZSL-2020-5598" }, { "db": "VULHUB", "id": "VHN-168691" }, { "db": "JVNDB", "id": "JVNDB-2020-008671" }, { "db": "CNNVD", "id": "CNNVD-202007-1390" }, { "db": "NVD", "id": "CVE-2020-15688" } ] }, "id": "VAR-202007-0690", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-168691" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:22:23.777000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Digest\u00a0Nonce\u00a0Handling\u00a0over\u00a0HTTP\u00a0#3", "trust": 0.8, "url": "https://github.com/embedthis/goahead-gpl/issues/3" }, { "title": "Embedthis Software GoAhead Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=125067" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-008671" }, { "db": "CNNVD", "id": "CNNVD-202007-1390" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-294", "trust": 1.1 }, { "problemtype": "Capture-replay authentication evasion by (CWE-294) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-168691" }, { "db": "JVNDB", "id": "JVNDB-2020-008671" }, { "db": "NVD", "id": "CVE-2020-15688" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://packetstormsecurity.com/files/159505/embedthis-goahead-web-server-5.1.1-digest-authentication-capture-replay-nonce-reuse.html" }, { "trust": 1.8, "url": "https://github.com/embedthis/goahead-gpl/issues/3" }, { "trust": 1.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-15688" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu92569237/index.html" }, { "trust": 0.7, "url": "https://cxsecurity.com/issue/wlb-2020100044" }, { "trust": 0.1, "url": "https://github.com/embedthis/goahead-gpl/issues/2" }, { "trust": 0.1, "url": "https://github.com/embedthis/appweb-gpl/issues/4" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-15688" }, { "trust": 0.1, "url": "https://www.tenable.com/cve/cve-2020-15688" }, { "trust": 0.1, "url": "https://cert.civis.net/en/index.php?action=alert\u0026amp;param=cve-2020-15688" }, { "trust": 0.1, "url": "https://packetstormsecurity.com/files/159505" }, { "trust": 0.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/185771" }, { "trust": 0.1, "url": "https://www.exploit-db.com/exploits/48958" } ], "sources": [ { "db": "ZSL", "id": "ZSL-2020-5598" }, { "db": "VULHUB", "id": "VHN-168691" }, { "db": "JVNDB", "id": "JVNDB-2020-008671" }, { "db": "CNNVD", "id": "CNNVD-202007-1390" }, { "db": "NVD", "id": "CVE-2020-15688" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZSL", "id": "ZSL-2020-5598" }, { "db": "VULHUB", "id": "VHN-168691" }, { "db": "JVNDB", "id": "JVNDB-2020-008671" }, { "db": "CNNVD", "id": "CNNVD-202007-1390" }, { "db": "NVD", "id": "CVE-2020-15688" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-10-06T00:00:00", "db": "ZSL", "id": "ZSL-2020-5598" }, { "date": "2020-07-23T00:00:00", "db": "VULHUB", "id": "VHN-168691" }, { "date": "2020-09-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-008671" }, { "date": "2020-07-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202007-1390" }, { "date": "2020-07-23T13:15:10.257000", "db": "NVD", "id": "CVE-2020-15688" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-11-04T00:00:00", "db": "ZSL", "id": "ZSL-2020-5598" }, { "date": "2023-01-31T00:00:00", "db": "VULHUB", "id": "VHN-168691" }, { "date": "2023-05-11T08:45:00", "db": "JVNDB", "id": "JVNDB-2020-008671" }, { "date": "2020-10-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202007-1390" }, { "date": "2024-11-21T05:06:01.080000", "db": "NVD", "id": "CVE-2020-15688" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202007-1390" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "GoAhead\u00a0 In \u00a0Capture-replay\u00a0 Authentication Bypass Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-008671" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202007-1390" } ], "trust": 0.6 } }
var-202208-0557
Vulnerability from variot
websda.c in GoAhead WebServer 2.1.8 has insufficient nonce entropy because the nonce calculation relies on the hardcoded onceuponatimeinparadise value, which does not follow the secret-data guideline for HTTP Digest Access Authentication in RFC 7616 section 3.3 (or RFC 2617 section 3.2.1). NOTE: 2.1.8 is a version from 2003; however, the affected websda.c code appears in multiple derivative works that may be used in 2021. Recent GoAhead software is unaffected. Embedthis Software, LLC of GoAhead Exists in a vulnerability related to lack of entropy.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Embedthis Software GoAhead is an open source small embedded Web server from Embedthis Software in the United States. Embedthis Software GoAhead WebServer version 2.1.8 has a security vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0557", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "goahead", "scope": "eq", "trust": 1.8, "vendor": "embedthis", "version": "2.1.8" }, { "model": "goahead", "scope": null, "trust": 0.8, "vendor": "embedthis", "version": null }, { "model": "goahead", "scope": "eq", "trust": 0.8, "vendor": "embedthis", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020145" }, { "db": "NVD", "id": "CVE-2021-41615" } ] }, "cve": "CVE-2021-41615", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-41615", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-41615", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-41615", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-41615", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202208-2477", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020145" }, { "db": "CNNVD", "id": "CNNVD-202208-2477" }, { "db": "NVD", "id": "CVE-2021-41615" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "websda.c in GoAhead WebServer 2.1.8 has insufficient nonce entropy because the nonce calculation relies on the hardcoded onceuponatimeinparadise value, which does not follow the secret-data guideline for HTTP Digest Access Authentication in RFC 7616 section 3.3 (or RFC 2617 section 3.2.1). NOTE: 2.1.8 is a version from 2003; however, the affected websda.c code appears in multiple derivative works that may be used in 2021. Recent GoAhead software is unaffected. Embedthis Software, LLC of GoAhead Exists in a vulnerability related to lack of entropy.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Embedthis Software GoAhead is an open source small embedded Web server from Embedthis Software in the United States. Embedthis Software GoAhead WebServer version 2.1.8 has a security vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2021-41615" }, { "db": "JVNDB", "id": "JVNDB-2021-020145" }, { "db": "VULHUB", "id": "VHN-402768" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-41615", "trust": 3.3 }, { "db": "ICS CERT", "id": "ICSA-23-129-02", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU92569237", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2021-020145", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2477", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-402768", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-402768" }, { "db": "JVNDB", "id": "JVNDB-2021-020145" }, { "db": "CNNVD", "id": "CNNVD-202208-2477" }, { "db": "NVD", "id": "CVE-2021-41615" } ] }, "id": "VAR-202208-0557", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-402768" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T12:15:48.755000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Embedthis Software GoAhead Fixing measures for security feature vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=204226" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2477" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-331", "trust": 1.1 }, { "problemtype": "Lack of entropy (CWE-331) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-402768" }, { "db": "JVNDB", "id": "JVNDB-2021-020145" }, { "db": "NVD", "id": "CVE-2021-41615" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://github.com/trenta3/goahead-versions/blob/master/2.1.8/230165webs218.tar.gz?raw=true" }, { "trust": 1.9, "url": "https://devel.rtems.org/browser/rtems/cpukit/httpd/websda.c?rev=c1427d2758079f0e9dd6a8de1662d78e0d6bc4ca" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-41615" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu92569237/" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-129-02" }, { "trust": 0.6, "url": "httpd/websda.c?rev=c1427d2758079f0e9dd6a8de1662d78e0d6bc4ca" }, { "trust": 0.6, "url": "https://devel.rtems.org/browser/rtems/cpukit/" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-41615/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-402768" }, { "db": "JVNDB", "id": "JVNDB-2021-020145" }, { "db": "CNNVD", "id": "CNNVD-202208-2477" }, { "db": "NVD", "id": "CVE-2021-41615" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-402768" }, { "db": "JVNDB", "id": "JVNDB-2021-020145" }, { "db": "CNNVD", "id": "CNNVD-202208-2477" }, { "db": "NVD", "id": "CVE-2021-41615" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-08T00:00:00", "db": "VULHUB", "id": "VHN-402768" }, { "date": "2023-09-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-020145" }, { "date": "2022-08-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2477" }, { "date": "2022-08-08T19:15:12.247000", "db": "NVD", "id": "CVE-2021-41615" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-12T00:00:00", "db": "VULHUB", "id": "VHN-402768" }, { "date": "2023-09-19T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-020145" }, { "date": "2022-08-15T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2477" }, { "date": "2022-08-12T15:02:53.073000", "db": "NVD", "id": "CVE-2021-41615" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2477" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Embedthis\u00a0Software,\u00a0LLC\u00a0 of \u00a0GoAhead\u00a0 Vulnerability regarding lack of entropy in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020145" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "security feature problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2477" } ], "trust": 0.6 } }
var-201503-0424
Vulnerability from variot
EmbedThis GoAhead 3.0.0 through 3.4.1 does not properly handle path segments starting with a . (dot), which allows remote attackers to conduct directory traversal attacks, cause a denial of service (heap-based buffer overflow and crash), or possibly execute arbitrary code via a crafted URI. EmbedThis GoAhead Is . Supplementary information : CWE Vulnerability type by CWE-17: Code ( code ) Has been identified. GoAhead WebServer is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input. Attackers can exploit this issue to obtain sensitive information or crash the application resulting in a denial-of-service condition. Successful exploits will lead to other attacks. GoAhead WebServer versions 3.0.0 through 3.4.1 are vulnerable. Embedthis Software GoAhead is an embedded Web server of American Embedthis Software company. Embedthis Software GoAhead version 3.0.0 to 3.4.1 has a security hole, the hole is due to the program does not correctly handle the part of the path starting with the '.' character. Affected software: GoAhead Web Server Affected versions: 3.0.0 - 3.4.1 (3.x.x series before 3.4.2) CVE ID: CVE-2014-9707
Description: The server incorrectly normalizes HTTP request URIs that contain path segments that start with a "." but are not entirely equal to "." or ".." (eg. ".x").
Fixed version: 3.4.2 Bug entry: https://github.com/embedthis/goahead/issues/106 Fix: https://github.com/embedthis/goahead/commit/eed4a7d177bf94a54c7b06ccce88507fbd76fb77 Reported by: Matthew Daley
Detail:
The vulnerability lies in the websNormalizeUriPath function.
A quick runthrough of the important parts of this function:
The function starts by splitting up the URI into segments (at forward slashes) into an array. At the same time, it calculates the total length of these segments.
The function then iterates through the resulting array in order to perform an in-place normalization (both the input and output pointers point to the same array):
-
If a given segment does not start with a '.', it is simply copied from the current input pointer to the current output pointer. The for loop's increment code will then advance both the input and output pointers.
-
Otherwise, if the segment is "." or "..", the input and output pointers are adjusted appropriately (taking into account the for loop's increment code) but (correctly) no segment is copied.
-
Otherwise the segment starts with a '.' but is not "." nor ".."; in this case the function incorrectly does nothing and both the input and output pointers are simply advanced by the for loop's increment code. This effectively skips over a segment in the segment array without any modification by the function.
After this iteration has completed, a string buffer for the final output is allocated. The size used for this allocation comes from the previously-calculated total segment length, with the addition of space for forward slashes to join the segments back together again and a null terminator. The segments in the array up to the final output pointer are joined together in this buffer with forward slashes separating them.
There are two ways to exploit this incorrect handling of certain segments:
1) Heap overflow
The heap overflow exploitation lies in the possibility to create a disconnect between the lengths of the segments left in the segment array after the iteration has completed and the previously-calculated total segment length. The previously-calculated length should, in theory, be the worst-case (longest) final output string buffer size required (when all segments are left and none are removed by the normalization iteration). However, since we can force the iteration to skip over certain segments in the array, it is possible to effectively duplicate segments in the resulting array; this is done by having the segment copied from one location to another but then also having the original copy skipped over, making it appear in the resulting array twice. When this is done, the previously-calculated length is no longer long enough for the final output's string buffer, and a heap overflow occurs while joining together the final result.
As an example, take the following URI as input to the function: "/./AAAAAAAA/.x".
The URI is first split into the segments "", ".", "AAAAAAAA" and ".", with the total segment length calculated as 0 + 1 + 8 + 2 = 11 bytes.
The normalization iteration proceeds as follows:
-
The "" segment is simply copied from input to output, and hence remains unchanged. Both the input and output pointers are then advanced.
-
The "." segment causes the output pointer to stay in place while the input pointer advances forward.
-
The "AAAAAAAA" segment is simply copied from input to output, and hence overwrites the previous "." segment. Both the input and output pointers are then advanced.
-
Finally, the ".x" segment is incorrectly handled: no modification of segments is performed but both the input and output pointers are still advanced, moving the output pointer over the original "AAAAAAAA" segment.
Hence, the resulting segments in the array that are left up to the final output pointer are "", "AAAAAAAA" and "AAAAAAAA". Note that the "AAAAAAAA" segment has been duplicated. These segments, including space for forward slashes to join them together with and a null terminator, have a total length of 0 + 8 + 8 + 2 + 1 = 19 bytes.
A string buffer is then allocated for the final output, which uses the previously-calculated total segment length of 11 bytes plus 3 bytes for forward slashes and 1 byte for a null terminator, giving a total size of 11 + 3 + 1 = 15 bytes.
The resulting segments are finally joined together into this final output string buffer. In doing so in this case, however, the buffer is overflowed by 19 - 15 = 4 bytes.
So, a remote attacker can make (ie.) a simple HTTP GET request for the URI in question and cause a heap overflow. ASAN gives the following output in this case, which shows the exact moment that the heap overflow occurs:
================================================================= ==2613==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000d47f at pc 0x7ffff6f34020 bp 0x7fffffffd410 sp 0x7fffffffcbd0 WRITE of size 9 at 0x60200000d47f thread T0 #0 0x7ffff6f3401f in __interceptor_strcpy (/usr/lib/x86_64-linux-gnu/libasan.so.1+0x2f01f) #1 0x7ffff63a7d6d in websNormalizeUriPath src/http.c:3320 #2 0x7ffff639b4de in parseFirstLine src/http.c:969 #3 0x7ffff639a905 in parseIncoming src/http.c:880 #4 0x7ffff639a4c9 in websPump src/http.c:829 #5 0x7ffff639a19c in readEvent src/http.c:802 #6 0x7ffff6399de7 in socketEvent src/http.c:740 #7 0x7ffff6399cbc in websAccept src/http.c:719 #8 0x7ffff63ac8ed in socketAccept src/socket.c:327 #9 0x7ffff63ade95 in socketDoEvent src/socket.c:638 #10 0x7ffff63add5f in socketProcess src/socket.c:622 #11 0x7ffff639daf8 in websServiceEvents src/http.c:1307 #12 0x401b5c in main src/goahead.c:153 #13 0x7ffff597ab44 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b44) #14 0x4011d8 (/home/matthew/goahead-3.4.1/build/linux-x64-debug/bin/goahead+0x4011d8)
0x60200000d47f is located 0 bytes to the right of 15-byte region [0x60200000d470,0x60200000d47f) allocated by thread T0 here: #0 0x7ffff6f5973f in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.1+0x5473f) #1 0x7ffff63a7d04 in websNormalizeUriPath src/http.c:3318 #2 0x7ffff639b4de in parseFirstLine src/http.c:969 #3 0x7ffff639a905 in parseIncoming src/http.c:880 #4 0x7ffff639a4c9 in websPump src/http.c:829 #5 0x7ffff639a19c in readEvent src/http.c:802 #6 0x7ffff6399de7 in socketEvent src/http.c:740 #7 0x7ffff6399cbc in websAccept src/http.c:719 #8 0x7ffff63ac8ed in socketAccept src/socket.c:327 #9 0x7ffff63ade95 in socketDoEvent src/socket.c:638 #10 0x7ffff63add5f in socketProcess src/socket.c:622 #11 0x7ffff639daf8 in websServiceEvents src/http.c:1307 #12 0x401b5c in main src/goahead.c:153 #13 0x7ffff597ab44 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b44) (... snip ...)
As with all heap overflows, it's likely that this can then go on to be exploited in order to gain full remote code execution, especially in embedded systems which are less likely to have heap allocators with modern hardening techniques.
2) Directory traversal
The directory traversal exploitation lies in the fact that we can force the normalization iteration to skip over certain segments in the array; namely, we can force it to skip over a ".." segment. The ".." segment will pass through unchanged into the final output string buffer, where it is treated by the rest of the server as an actual parent-directory relative segment.
As an example, take the following URI as input to the function: "/../../../../../.x/.x/.x/.x/.x/.x/etc/passwd".
The URI is first split into the segments "", "..", "..", "..", "..", "..", ".x", ".x", ".x", ".x", ".x", ".x", "etc", and "passwd". (The total segment length that is calculated during this operation is irrelevant for this mode of exploitation.)
When the normalization iteration reaches the ".x" segments, the contents of the segment array are still untouched (as all the previous segments are either empty or are "..") and the output pointer is still pointing back at the "" segment. The incorrect handling of the ".x" segments only causes the output (and input) pointers to be advanced forward over the "" and ".." segments.
When the iteration reaches the "etc" segment, all the "" and ".." segments have been skipped over; the output pointer is now pointing at the first ".x" segment. The "etc" is copied over the first ".x" segment, and the "passwd" segment is copied over the second ".x" segment.
Hence, the resulting segments in the array that are left up to the final output pointer are "", "..", "..", "..", "..", "..", "etc" and "passwd"; note that the ".." segments are still present.
The final output string buffer is created and the resulting segments are joined together to give a string of "/../../../../../etc/passwd".
The rest of the server is expecting that the result from the function is normalized and that it contains no relative segments. Hence, the ".." segments go unnoticed when opening the content file while handling the HTTP request. The end result is that the local filesystem is traversed up from the administrator-configured web root until reaching the filesystem's root directory and back down again into the "/etc/passwd" file. Hence, the file "/etc/passwd" is given in response to the HTTP request, regardless of the configured web root.
So, a remote attacker can make (ie.) a simple HTTP GET request for the URI in question and get the contents of the "/etc/passwd" file:
$ echo -ne 'GET /../../../../../.x/.x/.x/.x/.x/.x/etc/passwd HTTP/1.0\r\n\r\n' | nc localhost 4700 HTTP/1.0 200 OK Server: GoAhead-http Date: Sun Nov 16 17:21:01 2014 Content-Length: 1346 Connection: close Last-Modified: Sat Oct 25 17:07:25 2014
root:x:0:0:root:/root:/bin/bash daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin bin:x:2:2:bin:/bin:/usr/sbin/nologin sys:x:3:3:sys:/dev:/usr/sbin/nologin sync:x:4:65534:sync:/bin:/bin/sync games:x:5:60:games:/usr/games:/usr/sbin/nologin man:x:6:12:man:/var/cache/man:/usr/sbin/nologin lp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin mail:x:8:8:mail:/var/mail:/usr/sbin/nologin (... snip ...)
Of course, 5 ".." segments may not be enough to reach the filesystem's root directory in all cases and so the crafted URI may have to be extended with more ".." and ".x" segments.
- Matthew Daley
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201503-0424", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "goahead", "scope": "eq", "trust": 1.6, "vendor": "embedthis", "version": "3.3.5" }, { "model": "goahead", "scope": "eq", "trust": 1.6, "vendor": "embedthis", "version": "3.3.6" }, { "model": "goahead", "scope": "eq", "trust": 1.6, "vendor": "embedthis", "version": "3.4.0" }, { "model": "goahead", "scope": "eq", "trust": 1.6, "vendor": "embedthis", "version": "3.3.1" }, { "model": "goahead", "scope": "eq", "trust": 1.6, "vendor": "embedthis", "version": "3.0.0" }, { "model": "goahead", "scope": "eq", "trust": 1.6, "vendor": "embedthis", "version": "3.3.2" }, { "model": "goahead", "scope": "eq", "trust": 1.6, "vendor": "embedthis", "version": "3.3.4" }, { "model": "goahead", "scope": "eq", "trust": 1.6, "vendor": "embedthis", "version": "3.3.3" }, { "model": "goahead", "scope": "eq", "trust": 0.8, "vendor": "embedthis", "version": "3.0.0 to 3.4.1" }, { "model": "webserver", "scope": "eq", "trust": 0.3, "vendor": "goahead", "version": "3.4.1" }, { "model": "webserver", "scope": "eq", "trust": 0.3, "vendor": "goahead", "version": "3.0.0" }, { "model": "webserver", "scope": "ne", "trust": 0.3, "vendor": "goahead", "version": "3.4.2" } ], "sources": [ { "db": "BID", "id": "73404" }, { "db": "JVNDB", "id": "JVNDB-2014-008006" }, { "db": "CNNVD", "id": "CNNVD-201503-646" }, { "db": "NVD", "id": "CVE-2014-9707" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:embedthis:goahead", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-008006" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Matthew Daley", "sources": [ { "db": "BID", "id": "73404" }, { "db": "PACKETSTORM", "id": "131156" } ], "trust": 0.4 }, "cve": "CVE-2014-9707", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2014-9707", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-77652", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2014-9707", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2014-9707", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201503-646", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-77652", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-77652" }, { "db": "JVNDB", "id": "JVNDB-2014-008006" }, { "db": "CNNVD", "id": "CNNVD-201503-646" }, { "db": "NVD", "id": "CVE-2014-9707" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EmbedThis GoAhead 3.0.0 through 3.4.1 does not properly handle path segments starting with a . (dot), which allows remote attackers to conduct directory traversal attacks, cause a denial of service (heap-based buffer overflow and crash), or possibly execute arbitrary code via a crafted URI. EmbedThis GoAhead Is . Supplementary information : CWE Vulnerability type by CWE-17: Code ( code ) Has been identified. GoAhead WebServer is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input. \nAttackers can exploit this issue to obtain sensitive information or crash the application resulting in a denial-of-service condition. Successful exploits will lead to other attacks. \nGoAhead WebServer versions 3.0.0 through 3.4.1 are vulnerable. Embedthis Software GoAhead is an embedded Web server of American Embedthis Software company. Embedthis Software GoAhead version 3.0.0 to 3.4.1 has a security hole, the hole is due to the program does not correctly handle the part of the path starting with the \u0027.\u0027 character. Affected software: GoAhead Web Server\nAffected versions: 3.0.0 - 3.4.1 (3.x.x series before 3.4.2)\nCVE ID: CVE-2014-9707\n\nDescription: The server incorrectly normalizes HTTP request URIs that\ncontain path segments that start with a \".\" but are not entirely equal\nto \".\" or \"..\" (eg. \".x\"). \n\nFixed version: 3.4.2\nBug entry: https://github.com/embedthis/goahead/issues/106\nFix: https://github.com/embedthis/goahead/commit/eed4a7d177bf94a54c7b06ccce88507fbd76fb77\nReported by: Matthew Daley\n\nDetail:\n\nThe vulnerability lies in the websNormalizeUriPath function. \n\n\nA quick runthrough of the important parts of this function:\n\nThe function starts by splitting up the URI into segments (at forward\nslashes) into an array. At the same time, it calculates the total\nlength of these segments. \n\nThe function then iterates through the resulting array in order to\nperform an in-place normalization (both the input and output pointers\npoint to the same array):\n\n* If a given segment does not start with a \u0027.\u0027, it is simply copied from the\n current input pointer to the current output pointer. The for loop\u0027s\n increment code will then advance both the input and output pointers. \n\n* Otherwise, if the segment is \".\" or \"..\", the input and output pointers are\n adjusted appropriately (taking into account the for loop\u0027s increment code)\n but (correctly) no segment is copied. \n\n* Otherwise the segment starts with a \u0027.\u0027 but is not \".\" nor \"..\"; in this\n case the function incorrectly does nothing and both the input and output\n pointers are simply advanced by the for loop\u0027s increment code. This\n effectively skips over a segment in the segment array without any\n modification by the function. \n\nAfter this iteration has completed, a string buffer for the final\noutput is allocated. The size used for this allocation comes from the\npreviously-calculated total segment length, with the addition of space\nfor forward slashes to join the segments back together again and a\nnull terminator. The segments in the array up to the final output\npointer are joined together in this buffer with forward slashes\nseparating them. \n\n\nThere are two ways to exploit this incorrect handling of certain segments:\n\n\n1) Heap overflow\n\nThe heap overflow exploitation lies in the possibility to create a\ndisconnect between the lengths of the segments left in the segment\narray after the iteration has completed and the previously-calculated\ntotal segment length. The previously-calculated length should, in\ntheory, be the worst-case (longest) final output string buffer size\nrequired (when all segments are left and none are removed by the\nnormalization iteration). However, since we can force the iteration to\nskip over certain segments in the array, it is possible to effectively\nduplicate segments in the resulting array; this is done by having the\nsegment copied from one location to another but then also having the\noriginal copy skipped over, making it appear in the resulting array\ntwice. When this is done, the previously-calculated length is no\nlonger long enough for the final output\u0027s string buffer, and a heap\noverflow occurs while joining together the final result. \n\nAs an example, take the following URI as input to the function:\n\"/./AAAAAAAA/.x\". \n\nThe URI is first split into the segments \"\", \".\", \"AAAAAAAA\" and \".\",\nwith the total segment length calculated as 0 + 1 + 8 + 2 = 11 bytes. \n\nThe normalization iteration proceeds as follows:\n\n* The \"\" segment is simply copied from input to output, and hence remains\n unchanged. Both the input and output pointers are then advanced. \n\n* The \".\" segment causes the output pointer to stay in place while the input\n pointer advances forward. \n\n* The \"AAAAAAAA\" segment is simply copied from input to output, and hence\n overwrites the previous \".\" segment. Both the input and output pointers are\n then advanced. \n\n* Finally, the \".x\" segment is incorrectly handled: no modification of\n segments is performed but both the input and output pointers are still\n advanced, moving the output pointer over the original \"AAAAAAAA\" segment. \n\nHence, the resulting segments in the array that are left up to the\nfinal output pointer are \"\", \"AAAAAAAA\" and \"AAAAAAAA\". Note that the\n\"AAAAAAAA\" segment has been duplicated. These segments, including\nspace for forward slashes to join them together with and a null\nterminator, have a total length of 0 + 8 + 8 + 2 + 1 = 19 bytes. \n\nA string buffer is then allocated for the final output, which uses the\npreviously-calculated total segment length of 11 bytes plus 3 bytes\nfor forward slashes and 1 byte for a null terminator, giving a total\nsize of 11 + 3 + 1 = 15 bytes. \n\nThe resulting segments are finally joined together into this final\noutput string buffer. In doing so in this case, however, the buffer is\noverflowed by 19 - 15 = 4 bytes. \n\nSo, a remote attacker can make (ie.) a simple HTTP GET request for the\nURI in question and cause a heap overflow. ASAN gives the following\noutput in this case, which shows the exact moment that the heap\noverflow occurs:\n\n=================================================================\n==2613==ERROR: AddressSanitizer: heap-buffer-overflow on address\n0x60200000d47f at pc 0x7ffff6f34020 bp 0x7fffffffd410 sp\n0x7fffffffcbd0\nWRITE of size 9 at 0x60200000d47f thread T0\n #0 0x7ffff6f3401f in __interceptor_strcpy\n(/usr/lib/x86_64-linux-gnu/libasan.so.1+0x2f01f)\n #1 0x7ffff63a7d6d in websNormalizeUriPath src/http.c:3320\n #2 0x7ffff639b4de in parseFirstLine src/http.c:969\n #3 0x7ffff639a905 in parseIncoming src/http.c:880\n #4 0x7ffff639a4c9 in websPump src/http.c:829\n #5 0x7ffff639a19c in readEvent src/http.c:802\n #6 0x7ffff6399de7 in socketEvent src/http.c:740\n #7 0x7ffff6399cbc in websAccept src/http.c:719\n #8 0x7ffff63ac8ed in socketAccept src/socket.c:327\n #9 0x7ffff63ade95 in socketDoEvent src/socket.c:638\n #10 0x7ffff63add5f in socketProcess src/socket.c:622\n #11 0x7ffff639daf8 in websServiceEvents src/http.c:1307\n #12 0x401b5c in main src/goahead.c:153\n #13 0x7ffff597ab44 in __libc_start_main\n(/lib/x86_64-linux-gnu/libc.so.6+0x21b44)\n #14 0x4011d8\n(/home/matthew/goahead-3.4.1/build/linux-x64-debug/bin/goahead+0x4011d8)\n\n0x60200000d47f is located 0 bytes to the right of 15-byte region\n[0x60200000d470,0x60200000d47f)\nallocated by thread T0 here:\n #0 0x7ffff6f5973f in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.1+0x5473f)\n #1 0x7ffff63a7d04 in websNormalizeUriPath src/http.c:3318\n #2 0x7ffff639b4de in parseFirstLine src/http.c:969\n #3 0x7ffff639a905 in parseIncoming src/http.c:880\n #4 0x7ffff639a4c9 in websPump src/http.c:829\n #5 0x7ffff639a19c in readEvent src/http.c:802\n #6 0x7ffff6399de7 in socketEvent src/http.c:740\n #7 0x7ffff6399cbc in websAccept src/http.c:719\n #8 0x7ffff63ac8ed in socketAccept src/socket.c:327\n #9 0x7ffff63ade95 in socketDoEvent src/socket.c:638\n #10 0x7ffff63add5f in socketProcess src/socket.c:622\n #11 0x7ffff639daf8 in websServiceEvents src/http.c:1307\n #12 0x401b5c in main src/goahead.c:153\n #13 0x7ffff597ab44 in __libc_start_main\n(/lib/x86_64-linux-gnu/libc.so.6+0x21b44)\n(... snip ...)\n\nAs with all heap overflows, it\u0027s likely that this can then go on to be\nexploited in order to gain full remote code execution, especially in\nembedded systems which are less likely to have heap allocators with\nmodern hardening techniques. \n\n\n2) Directory traversal\n\nThe directory traversal exploitation lies in the fact that we can\nforce the normalization iteration to skip over certain segments in the\narray; namely, we can force it to skip over a \"..\" segment. The \"..\"\nsegment will pass through unchanged into the final output string\nbuffer, where it is treated by the rest of the server as an actual\nparent-directory relative segment. \n\nAs an example, take the following URI as input to the function:\n\"/../../../../../.x/.x/.x/.x/.x/.x/etc/passwd\". \n\nThe URI is first split into the segments \"\", \"..\", \"..\", \"..\", \"..\",\n\"..\", \".x\", \".x\", \".x\", \".x\", \".x\", \".x\", \"etc\", and \"passwd\". (The\ntotal segment length that is calculated during this operation is\nirrelevant for this mode of exploitation.)\n\nWhen the normalization iteration reaches the \".x\" segments, the\ncontents of the segment array are still untouched (as all the previous\nsegments are either empty or are \"..\") and the output pointer is still\npointing back at the \"\" segment. The incorrect handling of the \".x\"\nsegments only causes the output (and input) pointers to be advanced\nforward over the \"\" and \"..\" segments. \n\nWhen the iteration reaches the \"etc\" segment, all the \"\" and \"..\"\nsegments have been skipped over; the output pointer is now pointing at\nthe first \".x\" segment. The \"etc\" is copied over the first \".x\"\nsegment, and the \"passwd\" segment is copied over the second \".x\"\nsegment. \n\nHence, the resulting segments in the array that are left up to the\nfinal output pointer are \"\", \"..\", \"..\", \"..\", \"..\", \"..\", \"etc\" and\n\"passwd\"; note that the \"..\" segments are still present. \n\nThe final output string buffer is created and the resulting segments\nare joined together to give a string of \"/../../../../../etc/passwd\". \n\nThe rest of the server is expecting that the result from the function\nis normalized and that it contains no relative segments. Hence, the\n\"..\" segments go unnoticed when opening the content file while\nhandling the HTTP request. The end result is that the local filesystem\nis traversed up from the administrator-configured web root until\nreaching the filesystem\u0027s root directory and back down again into the\n\"/etc/passwd\" file. Hence, the file \"/etc/passwd\" is given in response\nto the HTTP request, regardless of the configured web root. \n\nSo, a remote attacker can make (ie.) a simple HTTP GET request for the\nURI in question and get the contents of the \"/etc/passwd\" file:\n\n$ echo -ne \u0027GET /../../../../../.x/.x/.x/.x/.x/.x/etc/passwd\nHTTP/1.0\\r\\n\\r\\n\u0027 | nc localhost 4700\nHTTP/1.0 200 OK\nServer: GoAhead-http\nDate: Sun Nov 16 17:21:01 2014\nContent-Length: 1346\nConnection: close\nLast-Modified: Sat Oct 25 17:07:25 2014\n\nroot:x:0:0:root:/root:/bin/bash\ndaemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin\nbin:x:2:2:bin:/bin:/usr/sbin/nologin\nsys:x:3:3:sys:/dev:/usr/sbin/nologin\nsync:x:4:65534:sync:/bin:/bin/sync\ngames:x:5:60:games:/usr/games:/usr/sbin/nologin\nman:x:6:12:man:/var/cache/man:/usr/sbin/nologin\nlp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin\nmail:x:8:8:mail:/var/mail:/usr/sbin/nologin\n(... snip ...)\n\nOf course, 5 \"..\" segments may not be enough to reach the filesystem\u0027s\nroot directory in all cases and so the crafted URI may have to be\nextended with more \"..\" and \".x\" segments. \n\n\n- Matthew Daley\n", "sources": [ { "db": "NVD", "id": "CVE-2014-9707" }, { "db": "JVNDB", "id": "JVNDB-2014-008006" }, { "db": "BID", "id": "73404" }, { "db": "VULHUB", "id": "VHN-77652" }, { "db": "PACKETSTORM", "id": "131156" } ], "trust": 2.07 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-77652", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-77652" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-9707", "trust": 2.9 }, { "db": "PACKETSTORM", "id": "131156", "trust": 1.2 }, { "db": "SECTRACK", "id": "1032208", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2014-008006", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201503-646", "trust": 0.7 }, { "db": "BID", "id": "73404", "trust": 0.4 }, { "db": "SEEBUG", "id": "SSVID-92042", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-77652", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-77652" }, { "db": "BID", "id": "73404" }, { "db": "JVNDB", "id": "JVNDB-2014-008006" }, { "db": "PACKETSTORM", "id": "131156" }, { "db": "CNNVD", "id": "CNNVD-201503-646" }, { "db": "NVD", "id": "CVE-2014-9707" } ] }, "id": "VAR-201503-0424", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-77652" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T23:09:15.868000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "GoAhead", "trust": 0.8, "url": "https://embedthis.com/goahead/" }, { "title": "FIX: Dot filename segments permit directory traversal [issue 106]", "trust": 0.8, "url": "https://github.com/embedthis/goahead/commit/eed4a7d177bf94a54c7b06ccce88507fbd76fb77" }, { "title": "URI Parsing Dot Segments #106", "trust": 0.8, "url": "https://github.com/embedthis/goahead/issues/106" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-008006" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-17", "trust": 1.1 }, { "problemtype": "CWE-Other", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-77652" }, { "db": "JVNDB", "id": "JVNDB-2014-008006" }, { "db": "NVD", "id": "CVE-2014-9707" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.1, "url": "https://github.com/embedthis/goahead/commit/eed4a7d177bf94a54c7b06ccce88507fbd76fb77" }, { "trust": 2.1, "url": "https://github.com/embedthis/goahead/issues/106" }, { "trust": 1.7, "url": "http://seclists.org/fulldisclosure/2015/mar/157" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/535027/100/0/threaded" }, { "trust": 1.1, "url": "http://packetstormsecurity.com/files/131156/goahead-3.4.1-heap-overflow-traversal.html" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1032208" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-9707" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-9707" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/535027/100/0/threaded" }, { "trust": 0.3, "url": "http://www.goahead.com/products/webserver/default.aspx" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-9707" } ], "sources": [ { "db": "VULHUB", "id": "VHN-77652" }, { "db": "BID", "id": "73404" }, { "db": "JVNDB", "id": "JVNDB-2014-008006" }, { "db": "PACKETSTORM", "id": "131156" }, { "db": "CNNVD", "id": "CNNVD-201503-646" }, { "db": "NVD", "id": "CVE-2014-9707" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-77652" }, { "db": "BID", "id": "73404" }, { "db": "JVNDB", "id": "JVNDB-2014-008006" }, { "db": "PACKETSTORM", "id": "131156" }, { "db": "CNNVD", "id": "CNNVD-201503-646" }, { "db": "NVD", "id": "CVE-2014-9707" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-03-31T00:00:00", "db": "VULHUB", "id": "VHN-77652" }, { "date": "2015-03-28T00:00:00", "db": "BID", "id": "73404" }, { "date": "2015-04-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-008006" }, { "date": "2015-03-28T18:02:22", "db": "PACKETSTORM", "id": "131156" }, { "date": "2015-03-31T00:00:00", "db": "CNNVD", "id": "CNNVD-201503-646" }, { "date": "2015-03-31T14:59:06.250000", "db": "NVD", "id": "CVE-2014-9707" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-09T00:00:00", "db": "VULHUB", "id": "VHN-77652" }, { "date": "2015-03-28T00:00:00", "db": "BID", "id": "73404" }, { "date": "2015-04-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-008006" }, { "date": "2015-04-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201503-646" }, { "date": "2024-11-21T02:21:29.230000", "db": "NVD", "id": "CVE-2014-9707" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201503-646" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EmbedThis GoAhead Vulnerable to directory traversal attacks", "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-008006" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Input Validation Error", "sources": [ { "db": "BID", "id": "73404" } ], "trust": 0.3 } }
var-201909-0756
Vulnerability from variot
An issue was discovered in Embedthis GoAhead 2.5.0. Certain pages (such as goform/login and config/log_off_page.htm) create links containing a hostname obtained from an arbitrary HTTP Host header sent by an attacker. This could potentially be used in a phishing attack. Embedthis GoAhead There is an injection vulnerability in.Information may be tampered with. Embedthis Software GoAhead is an embedded Web server of American Embedthis Software company. A security vulnerability exists in Embedthis Software GoAhead version 2.5.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201909-0756", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "goahead", "scope": "eq", "trust": 1.8, "vendor": "embedthis", "version": "2.5.0" }, { "model": "goahead", "scope": "eq", "trust": 0.8, "vendor": "embedthis", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-009589" }, { "db": "NVD", "id": "CVE-2019-16645" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ramikan", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-1005" } ], "trust": 0.6 }, "cve": "CVE-2019-16645", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2019-16645", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-148812", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2019-16645", "impactScore": 4.0, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 8.6, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-16645", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-16645", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2019-16645", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201909-1005", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-148812", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-148812" }, { "db": "JVNDB", "id": "JVNDB-2019-009589" }, { "db": "CNNVD", "id": "CNNVD-201909-1005" }, { "db": "NVD", "id": "CVE-2019-16645" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered in Embedthis GoAhead 2.5.0. Certain pages (such as goform/login and config/log_off_page.htm) create links containing a hostname obtained from an arbitrary HTTP Host header sent by an attacker. This could potentially be used in a phishing attack. Embedthis GoAhead There is an injection vulnerability in.Information may be tampered with. Embedthis Software GoAhead is an embedded Web server of American Embedthis Software company. A security vulnerability exists in Embedthis Software GoAhead version 2.5.0", "sources": [ { "db": "NVD", "id": "CVE-2019-16645" }, { "db": "JVNDB", "id": "JVNDB-2019-009589" }, { "db": "VULHUB", "id": "VHN-148812" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-16645", "trust": 3.3 }, { "db": "PACKETSTORM", "id": "154652", "trust": 1.7 }, { "db": "JVN", "id": "JVNVU92569237", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-009589", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201909-1005", "trust": 0.7 }, { "db": "EXPLOIT-DB", "id": "47439", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-148812", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-148812" }, { "db": "JVNDB", "id": "JVNDB-2019-009589" }, { "db": "CNNVD", "id": "CNNVD-201909-1005" }, { "db": "NVD", "id": "CVE-2019-16645" } ] }, "id": "VAR-201909-0756", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-148812" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T20:53:20.282000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top\u00a0Page", "trust": 0.8, "url": "https://www.embedthis.com/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-009589" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-94", "trust": 1.1 }, { "problemtype": "injection (CWE-74) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-74", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-148812" }, { "db": "JVNDB", "id": "JVNDB-2019-009589" }, { "db": "NVD", "id": "CVE-2019-16645" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://github.com/ramikan/vulnerabilities/blob/master/goahead%20web%20server%20http%20header%20injection" }, { "trust": 1.7, "url": "http://packetstormsecurity.com/files/154652/goahead-2.5.0-host-header-injection.html" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-16645" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu92569237/index.html" }, { "trust": 0.6, "url": "https://www.exploit-db.com/exploits/47439" } ], "sources": [ { "db": "VULHUB", "id": "VHN-148812" }, { "db": "JVNDB", "id": "JVNDB-2019-009589" }, { "db": "CNNVD", "id": "CNNVD-201909-1005" }, { "db": "NVD", "id": "CVE-2019-16645" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-148812" }, { "db": "JVNDB", "id": "JVNDB-2019-009589" }, { "db": "CNNVD", "id": "CNNVD-201909-1005" }, { "db": "NVD", "id": "CVE-2019-16645" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-09-20T00:00:00", "db": "VULHUB", "id": "VHN-148812" }, { "date": "2019-09-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-009589" }, { "date": "2019-09-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201909-1005" }, { "date": "2019-09-20T19:15:11.860000", "db": "NVD", "id": "CVE-2019-16645" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-24T00:00:00", "db": "VULHUB", "id": "VHN-148812" }, { "date": "2023-05-11T08:50:00", "db": "JVNDB", "id": "JVNDB-2019-009589" }, { "date": "2020-09-02T00:00:00", "db": "CNNVD", "id": "CNNVD-201909-1005" }, { "date": "2024-11-21T04:30:52.687000", "db": "NVD", "id": "CVE-2019-16645" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-1005" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Embedthis\u00a0GoAhead\u00a0 Injection vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-009589" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-201909-1005" } ], "trust": 0.6 } }
var-201912-0787
Vulnerability from variot
An exploitable code execution vulnerability exists in the processing of multi-part/form-data requests within the base GoAhead web server application in versions v5.0.1, v.4.1.1 and v3.6.5. A specially crafted HTTP request can lead to a use-after-free condition during the processing of this request that can be used to corrupt heap structures that could lead to full code execution. The request can be unauthenticated in the form of GET or POST requests, and does not require the requested resource to exist on the server. GoAhead web Server applications contain a usage of freed memory vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Embedthis Software GoAhead is an embedded Web server of American Embedthis Software company. Attackers can exploit this vulnerability to damage the heap structure and execute code
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-0787", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "goahead", "scope": "eq", "trust": 1.8, "vendor": "embedthis", "version": "4.1.1" }, { "model": "goahead", "scope": "eq", "trust": 1.8, "vendor": "embedthis", "version": "5.0.1" }, { "model": "goahead", "scope": "eq", "trust": 1.8, "vendor": "embedthis", "version": "3.6.5" }, { "model": "goahead", "scope": "eq", "trust": 0.8, "vendor": "embedthis", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-012628" }, { "db": "NVD", "id": "CVE-2019-5096" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Discovered by a member of Cisco Talos.", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-058" } ], "trust": 0.6 }, "cve": "CVE-2019-5096", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2019-5096", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-156531", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "talos-cna@cisco.com", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2019-5096", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2019-5096", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-5096", "trust": 1.0, "value": "CRITICAL" }, { "author": "talos-cna@cisco.com", "id": "CVE-2019-5096", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2019-5096", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-201912-058", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-156531", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2019-5096", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-156531" }, { "db": "VULMON", "id": "CVE-2019-5096" }, { "db": "JVNDB", "id": "JVNDB-2019-012628" }, { "db": "CNNVD", "id": "CNNVD-201912-058" }, { "db": "NVD", "id": "CVE-2019-5096" }, { "db": "NVD", "id": "CVE-2019-5096" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An exploitable code execution vulnerability exists in the processing of multi-part/form-data requests within the base GoAhead web server application in versions v5.0.1, v.4.1.1 and v3.6.5. A specially crafted HTTP request can lead to a use-after-free condition during the processing of this request that can be used to corrupt heap structures that could lead to full code execution. The request can be unauthenticated in the form of GET or POST requests, and does not require the requested resource to exist on the server. GoAhead web Server applications contain a usage of freed memory vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Embedthis Software GoAhead is an embedded Web server of American Embedthis Software company. Attackers can exploit this vulnerability to damage the heap structure and execute code", "sources": [ { "db": "NVD", "id": "CVE-2019-5096" }, { "db": "JVNDB", "id": "JVNDB-2019-012628" }, { "db": "VULHUB", "id": "VHN-156531" }, { "db": "VULMON", "id": "CVE-2019-5096" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-5096", "trust": 3.4 }, { "db": "TALOS", "id": "TALOS-2019-0888", "trust": 2.6 }, { "db": "JVN", "id": "JVNVU93901424", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-012628", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201912-058", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2023.0511", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-156531", "trust": 0.1 }, { "db": "ICS CERT", "id": "ICSA-23-026-06", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-5096", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-156531" }, { "db": "VULMON", "id": "CVE-2019-5096" }, { "db": "JVNDB", "id": "JVNDB-2019-012628" }, { "db": "CNNVD", "id": "CNNVD-201912-058" }, { "db": "NVD", "id": "CVE-2019-5096" } ] }, "id": "VAR-201912-0787", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-156531" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:25:39.645000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "GoAhead", "trust": 0.8, "url": "https://www.embedthis.com/goahead/" }, { "title": "Embedthis Software GoAhead Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=103856" }, { "title": "CVE-2019-5096-GoAhead-Web-Server-Dos-Exploit", "trust": 0.1, "url": "https://github.com/papinnon/CVE-2019-5096-GoAhead-Web-Server-Dos-Exploit " }, { "title": "SecBooks", "trust": 0.1, "url": "https://github.com/SexyBeast233/SecBooks " }, { "title": "CVE-POC", "trust": 0.1, "url": "https://github.com/0xT11/CVE-POC " }, { "title": "PoC", "trust": 0.1, "url": "https://github.com/Jonathan-Elias/PoC " }, { "title": "PoC-in-GitHub", "trust": 0.1, "url": "https://github.com/developer3000S/PoC-in-GitHub " }, { "title": "PoC-in-GitHub", "trust": 0.1, "url": "https://github.com/hectorgie/PoC-in-GitHub " }, { "title": "PoC-in-GitHub", "trust": 0.1, "url": "https://github.com/nomi-sec/PoC-in-GitHub " } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-5096" }, { "db": "JVNDB", "id": "JVNDB-2019-012628" }, { "db": "CNNVD", "id": "CNNVD-201912-058" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 }, { "problemtype": "Use of freed memory (CWE-416) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-156531" }, { "db": "JVNDB", "id": "JVNDB-2019-012628" }, { "db": "NVD", "id": "CVE-2019-5096" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://talosintelligence.com/vulnerability_reports/talos-2019-0888" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-5096" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu93901424/" }, { "trust": 0.6, "url": "https://www.talosintelligence.com/vulnerability_reports/talos-2019-0888" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2023.0511" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/416.html" }, { "trust": 0.1, "url": "https://github.com/papinnon/cve-2019-5096-goahead-web-server-dos-exploit" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-23-026-06" }, { "trust": 0.1, "url": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/111096" } ], "sources": [ { "db": "VULHUB", "id": "VHN-156531" }, { "db": "VULMON", "id": "CVE-2019-5096" }, { "db": "JVNDB", "id": "JVNDB-2019-012628" }, { "db": "CNNVD", "id": "CNNVD-201912-058" }, { "db": "NVD", "id": "CVE-2019-5096" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-156531" }, { "db": "VULMON", "id": "CVE-2019-5096" }, { "db": "JVNDB", "id": "JVNDB-2019-012628" }, { "db": "CNNVD", "id": "CNNVD-201912-058" }, { "db": "NVD", "id": "CVE-2019-5096" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-03T00:00:00", "db": "VULHUB", "id": "VHN-156531" }, { "date": "2019-12-03T00:00:00", "db": "VULMON", "id": "CVE-2019-5096" }, { "date": "2019-12-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-012628" }, { "date": "2019-12-02T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-058" }, { "date": "2019-12-03T22:15:14.823000", "db": "NVD", "id": "CVE-2019-5096" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-06T00:00:00", "db": "VULHUB", "id": "VHN-156531" }, { "date": "2022-06-17T00:00:00", "db": "VULMON", "id": "CVE-2019-5096" }, { "date": "2023-01-30T08:58:00", "db": "JVNDB", "id": "JVNDB-2019-012628" }, { "date": "2023-01-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-058" }, { "date": "2024-11-21T04:44:20.800000", "db": "NVD", "id": "CVE-2019-5096" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-058" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "GoAhead\u00a0web\u00a0 Use of freed memory vulnerability in server applications", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-012628" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-058" } ], "trust": 0.6 } }
var-201912-0788
Vulnerability from variot
A denial-of-service vulnerability exists in the processing of multi-part/form-data requests in the base GoAhead web server application in versions v5.0.1, v.4.1.1 and v3.6.5. A specially crafted HTTP request can lead to an infinite loop in the process. The request can be unauthenticated in the form of GET or POST requests and does not require the requested resource to exist on the server. GoAhead web Server applications contain an infinite loop vulnerability.Service operation interruption (DoS) It may be in a state. Embedthis Software GoAhead is an embedded Web server of American Embedthis Software company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-0788", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "goahead", "scope": "eq", "trust": 1.8, "vendor": "embedthis", "version": "5.0.1" }, { "model": "goahead", "scope": "eq", "trust": 1.8, "vendor": "embedthis", "version": "3.6.5" }, { "model": "goahead", "scope": "eq", "trust": 1.8, "vendor": "embedthis", "version": "4.1.1" }, { "model": "goahead", "scope": "eq", "trust": 0.8, "vendor": "embedthis", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-012622" }, { "db": "NVD", "id": "CVE-2019-5097" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Discovered by a Cisco Talos researcher.", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-050" } ], "trust": 0.6 }, "cve": "CVE-2019-5097", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2019-5097", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-156532", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2019-5097", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "talos-cna@cisco.com", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2019-5097", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2019-5097", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-5097", "trust": 1.0, "value": "HIGH" }, { "author": "talos-cna@cisco.com", "id": "CVE-2019-5097", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2019-5097", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201912-050", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-156532", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2019-5097", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-156532" }, { "db": "VULMON", "id": "CVE-2019-5097" }, { "db": "JVNDB", "id": "JVNDB-2019-012622" }, { "db": "CNNVD", "id": "CNNVD-201912-050" }, { "db": "NVD", "id": "CVE-2019-5097" }, { "db": "NVD", "id": "CVE-2019-5097" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A denial-of-service vulnerability exists in the processing of multi-part/form-data requests in the base GoAhead web server application in versions v5.0.1, v.4.1.1 and v3.6.5. A specially crafted HTTP request can lead to an infinite loop in the process. The request can be unauthenticated in the form of GET or POST requests and does not require the requested resource to exist on the server. GoAhead web Server applications contain an infinite loop vulnerability.Service operation interruption (DoS) It may be in a state. Embedthis Software GoAhead is an embedded Web server of American Embedthis Software company", "sources": [ { "db": "NVD", "id": "CVE-2019-5097" }, { "db": "JVNDB", "id": "JVNDB-2019-012622" }, { "db": "VULHUB", "id": "VHN-156532" }, { "db": "VULMON", "id": "CVE-2019-5097" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-5097", "trust": 3.4 }, { "db": "TALOS", "id": "TALOS-2019-0889", "trust": 2.6 }, { "db": "JVN", "id": "JVNVU93901424", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU98006842", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-24-319-16", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2019-012622", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201912-050", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2023.0511", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-156532", "trust": 0.1 }, { "db": "ICS CERT", "id": "ICSA-23-026-06", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-5097", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-156532" }, { "db": "VULMON", "id": "CVE-2019-5097" }, { "db": "JVNDB", "id": "JVNDB-2019-012622" }, { "db": "CNNVD", "id": "CNNVD-201912-050" }, { "db": "NVD", "id": "CVE-2019-5097" } ] }, "id": "VAR-201912-0788", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-156532" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:25:39.675000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "GoAhead", "trust": 0.8, "url": "https://www.embedthis.com/goahead/" }, { "title": "Embedthis Software GoAhead Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=104256" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-012622" }, { "db": "CNNVD", "id": "CNNVD-201912-050" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-835", "trust": 1.1 }, { "problemtype": "infinite loop (CWE-835) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-156532" }, { "db": "JVNDB", "id": "JVNDB-2019-012622" }, { "db": "NVD", "id": "CVE-2019-5097" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://talosintelligence.com/vulnerability_reports/talos-2019-0889" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-5097" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu93901424/" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu98006842/index.html" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-319-16" }, { "trust": 0.6, "url": "https://www.talosintelligence.com/vulnerability_reports/talos-2019-0889" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2023.0511" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/835.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-23-026-06" }, { "trust": 0.1, "url": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/111098" } ], "sources": [ { "db": "VULHUB", "id": "VHN-156532" }, { "db": "VULMON", "id": "CVE-2019-5097" }, { "db": "JVNDB", "id": "JVNDB-2019-012622" }, { "db": "CNNVD", "id": "CNNVD-201912-050" }, { "db": "NVD", "id": "CVE-2019-5097" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-156532" }, { "db": "VULMON", "id": "CVE-2019-5097" }, { "db": "JVNDB", "id": "JVNDB-2019-012622" }, { "db": "CNNVD", "id": "CNNVD-201912-050" }, { "db": "NVD", "id": "CVE-2019-5097" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-03T00:00:00", "db": "VULHUB", "id": "VHN-156532" }, { "date": "2019-12-03T00:00:00", "db": "VULMON", "id": "CVE-2019-5097" }, { "date": "2019-12-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-012622" }, { "date": "2019-12-02T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-050" }, { "date": "2019-12-03T22:15:14.900000", "db": "NVD", "id": "CVE-2019-5097" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-06T00:00:00", "db": "VULHUB", "id": "VHN-156532" }, { "date": "2022-06-17T00:00:00", "db": "VULMON", "id": "CVE-2019-5097" }, { "date": "2024-11-18T05:32:00", "db": "JVNDB", "id": "JVNDB-2019-012622" }, { "date": "2023-01-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-050" }, { "date": "2024-11-21T04:44:20.923000", "db": "NVD", "id": "CVE-2019-5097" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-050" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "GoAhead\u00a0web\u00a0 Infinite loop vulnerability in server applications", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-012622" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-050" } ], "trust": 0.6 } }
var-201911-1358
Vulnerability from variot
Embedthis GoAhead before 5.0.1 mishandles redirected HTTP requests with a large Host header. The GoAhead WebsRedirect uses a static host buffer that has a limited length and can overflow. This can cause a copy of the Host header to fail, leaving that buffer uninitialized, which may leak uninitialized data in a response. Embedthis GoAhead Contains a buffer error vulnerability.Information may be obtained. Embedthis Software GoAhead is an embedded Web server of American Embedthis Software company. A buffer error vulnerability exists in Embedthis Software GoAhead versions prior to 5.0.1. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201911-1358", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "goahead", "scope": "lt", "trust": 1.8, "vendor": "embedthis", "version": "5.0.1" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-012569" }, { "db": "NVD", "id": "CVE-2019-19240" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:embedthis:goahead", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-012569" } ] }, "cve": "CVE-2019-19240", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2019-19240", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-151667", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "id": "CVE-2019-19240", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2019-19240", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-19240", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2019-19240", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201911-1314", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-151667", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-151667" }, { "db": "JVNDB", "id": "JVNDB-2019-012569" }, { "db": "CNNVD", "id": "CNNVD-201911-1314" }, { "db": "NVD", "id": "CVE-2019-19240" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Embedthis GoAhead before 5.0.1 mishandles redirected HTTP requests with a large Host header. The GoAhead WebsRedirect uses a static host buffer that has a limited length and can overflow. This can cause a copy of the Host header to fail, leaving that buffer uninitialized, which may leak uninitialized data in a response. Embedthis GoAhead Contains a buffer error vulnerability.Information may be obtained. Embedthis Software GoAhead is an embedded Web server of American Embedthis Software company. A buffer error vulnerability exists in Embedthis Software GoAhead versions prior to 5.0.1. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc", "sources": [ { "db": "NVD", "id": "CVE-2019-19240" }, { "db": "JVNDB", "id": "JVNDB-2019-012569" }, { "db": "VULHUB", "id": "VHN-151667" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-19240", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2019-012569", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201911-1314", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-151667", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-151667" }, { "db": "JVNDB", "id": "JVNDB-2019-012569" }, { "db": "CNNVD", "id": "CNNVD-201911-1314" }, { "db": "NVD", "id": "CVE-2019-19240" } ] }, "id": "VAR-201911-1358", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-151667" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:05:56.290000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "v5.0.1", "trust": 0.8, "url": "https://github.com/embedthis/goahead/releases/tag/v5.0.1" }, { "title": "WebsRedirect disclosure with large host names #289", "trust": 0.8, "url": "https://github.com/embedthis/goahead/issues/289" }, { "title": "WebsRedirect information disclosure #290", "trust": 0.8, "url": "https://github.com/embedthis/goahead/issues/290" }, { "title": "Embedthis Software GoAhead Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=103450" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-012569" }, { "db": "CNNVD", "id": "CNNVD-201911-1314" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-908", "trust": 1.1 }, { "problemtype": "CWE-119", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-151667" }, { "db": "JVNDB", "id": "JVNDB-2019-012569" }, { "db": "NVD", "id": "CVE-2019-19240" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://github.com/embedthis/goahead/issues/289" }, { "trust": 1.7, "url": "https://github.com/embedthis/goahead/issues/290" }, { "trust": 1.7, "url": "https://github.com/embedthis/goahead/releases/tag/v5.0.1" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19240" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-19240" } ], "sources": [ { "db": "VULHUB", "id": "VHN-151667" }, { "db": "JVNDB", "id": "JVNDB-2019-012569" }, { "db": "CNNVD", "id": "CNNVD-201911-1314" }, { "db": "NVD", "id": "CVE-2019-19240" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-151667" }, { "db": "JVNDB", "id": "JVNDB-2019-012569" }, { "db": "CNNVD", "id": "CNNVD-201911-1314" }, { "db": "NVD", "id": "CVE-2019-19240" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-11-22T00:00:00", "db": "VULHUB", "id": "VHN-151667" }, { "date": "2019-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-012569" }, { "date": "2019-11-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201911-1314" }, { "date": "2019-11-22T19:15:12.857000", "db": "NVD", "id": "CVE-2019-19240" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-24T00:00:00", "db": "VULHUB", "id": "VHN-151667" }, { "date": "2019-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-012569" }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201911-1314" }, { "date": "2024-11-21T04:34:23.607000", "db": "NVD", "id": "CVE-2019-19240" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201911-1314" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Embedthis GoAhead Buffer error vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-012569" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201911-1314" } ], "trust": 0.6 } }
var-201808-0470
Vulnerability from variot
An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. The server mishandles some HTTP request fields associated with time, which results in a NULL pointer dereference, as demonstrated by If-Modified-Since or If-Unmodified-Since with a month greater than 11. Embedthis GoAhead and Appweb for, NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state. Embedthis GoAhead and Appweb are both products of Embedthis Software in the United States. Embedthis GoAhead is an embedded Web server. Appweb is a fast and small web server, which is mainly used for embedded applications, devices and web services, and supports security defense strategies, digest authentication, virtual hosts, etc. Embedthis GoAhead versions prior to 4.0.1 and Appweb versions prior to 7.0.2 have a security vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201808-0470", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "15.1x53" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "18.2" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "18.3" }, { "model": "goahead", "scope": "lt", "trust": 1.0, "vendor": "embedthis", "version": "4.0.1" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "12.3" }, { "model": "appweb", "scope": "lt", "trust": 1.0, "vendor": "embedthis", "version": "7.0.2" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "17.3" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "12.1x46" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "17.4" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "15.1x49" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "17.2" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "16.2" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "17.1" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "15.1" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "18.4" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "12.3x48" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "18.1" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "16.1" }, { "model": "goahead", "scope": "eq", "trust": 0.8, "vendor": "embedthis", "version": "4.0.1" }, { "model": "appweb", "scope": null, "trust": 0.8, "vendor": "embedthis", "version": null }, { "model": "goahead", "scope": "eq", "trust": 0.6, "vendor": "embedthis", "version": "3.3.4" }, { "model": "goahead", "scope": "eq", "trust": 0.6, "vendor": "embedthis", "version": "3.3.5" }, { "model": "goahead", "scope": "eq", "trust": 0.6, "vendor": "embedthis", "version": "3.3.3" }, { "model": "goahead", "scope": "eq", "trust": 0.6, "vendor": "embedthis", "version": "3.3.1" }, { "model": "appweb", "scope": "eq", "trust": 0.6, "vendor": "embedthis", "version": "4.6.5" }, { "model": "appweb", "scope": "eq", "trust": 0.6, "vendor": "embedthis", "version": "5.2.0" }, { "model": "appweb", "scope": "eq", "trust": 0.6, "vendor": "embedthis", "version": "5.1.0" }, { "model": "appweb", "scope": "eq", "trust": 0.6, "vendor": "embedthis", "version": "5.0.0" }, { "model": "goahead", "scope": "eq", "trust": 0.6, "vendor": "embedthis", "version": "3.0.0" }, { "model": "goahead", "scope": "eq", "trust": 0.6, "vendor": "embedthis", "version": "3.3.2" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-009304" }, { "db": "CNNVD", "id": "CNNVD-201808-526" }, { "db": "NVD", "id": "CVE-2018-15504" } ] }, "cve": "CVE-2018-15504", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2018-15504", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-125770", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2018-15504", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2018-15504", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-15504", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2018-15504", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201808-526", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-125770", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-125770" }, { "db": "JVNDB", "id": "JVNDB-2018-009304" }, { "db": "CNNVD", "id": "CNNVD-201808-526" }, { "db": "NVD", "id": "CVE-2018-15504" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. The server mishandles some HTTP request fields associated with time, which results in a NULL pointer dereference, as demonstrated by If-Modified-Since or If-Unmodified-Since with a month greater than 11. Embedthis GoAhead and Appweb for, NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state. Embedthis GoAhead and Appweb are both products of Embedthis Software in the United States. Embedthis GoAhead is an embedded Web server. Appweb is a fast and small web server, which is mainly used for embedded applications, devices and web services, and supports security defense strategies, digest authentication, virtual hosts, etc. Embedthis GoAhead versions prior to 4.0.1 and Appweb versions prior to 7.0.2 have a security vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2018-15504" }, { "db": "JVNDB", "id": "JVNDB-2018-009304" }, { "db": "VULHUB", "id": "VHN-125770" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-15504", "trust": 3.3 }, { "db": "JVN", "id": "JVNVU92569237", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2018-009304", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201808-526", "trust": 0.7 }, { "db": "JUNIPER", "id": "JSA10948", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.2562", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-125770", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-125770" }, { "db": "JVNDB", "id": "JVNDB-2018-009304" }, { "db": "CNNVD", "id": "CNNVD-201808-526" }, { "db": "NVD", "id": "CVE-2018-15504" } ] }, "id": "VAR-201808-0470", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-125770" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:08:37.453000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "NULL\u00a0dereference\u00a0for\u00a0invalid\u00a0Host\u00a0and\u00a0If-Modified-*\u00a0headers\u00a0#605 GitHub", "trust": 0.8, "url": "https://github.com/embedthis/appweb/commit/66067ae6d1fa08b37a270e7dc1821df52ed2daef" }, { "title": "Embedthis GoAhead and Appweb Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=84129" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-009304" }, { "db": "CNNVD", "id": "CNNVD-201808-526" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-125770" }, { "db": "JVNDB", "id": "JVNDB-2018-009304" }, { "db": "NVD", "id": "CVE-2018-15504" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://github.com/embedthis/appweb/commit/66067ae6d1fa08b37a270e7dc1821df52ed2daef" }, { "trust": 1.7, "url": "https://github.com/embedthis/appweb/issues/605" }, { "trust": 1.7, "url": "https://github.com/embedthis/goahead/issues/264" }, { "trust": 1.6, "url": "https://supportportal.juniper.net/s/article/2019-07-security-bulletin-junos-os-j-web-denial-of-service-due-to-multiple-vulnerabilities-in-embedthis-appweb-server" }, { "trust": 1.6, "url": "https://supportportal.juniper.net/s/article/2021-07-security-bulletin-junos-os-multiple-j-web-vulnerabilities-resolved" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu92569237/index.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-15504" }, { "trust": 0.6, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10948" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/embedthis-goahead-appweb-null-pointer-dereference-via-http-request-29746" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.2562/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-125770" }, { "db": "JVNDB", "id": "JVNDB-2018-009304" }, { "db": "CNNVD", "id": "CNNVD-201808-526" }, { "db": "NVD", "id": "CVE-2018-15504" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-125770" }, { "db": "JVNDB", "id": "JVNDB-2018-009304" }, { "db": "CNNVD", "id": "CNNVD-201808-526" }, { "db": "NVD", "id": "CVE-2018-15504" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-08-18T00:00:00", "db": "VULHUB", "id": "VHN-125770" }, { "date": "2018-11-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-009304" }, { "date": "2018-08-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201808-526" }, { "date": "2018-08-18T03:29:00.237000", "db": "NVD", "id": "CVE-2018-15504" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-19T00:00:00", "db": "VULHUB", "id": "VHN-125770" }, { "date": "2023-05-11T08:50:00", "db": "JVNDB", "id": "JVNDB-2018-009304" }, { "date": "2023-06-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201808-526" }, { "date": "2024-11-21T03:50:57.413000", "db": "NVD", "id": "CVE-2018-15504" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201808-526" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Embedthis\u00a0GoAhead\u00a0 and \u00a0Appweb\u00a0 In \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-009304" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201808-526" } ], "trust": 0.6 } }
var-201712-0864
Vulnerability from variot
Embedthis GoAhead before 3.6.5 allows remote code execution if CGI is enabled and a CGI program is dynamically linked. This is a result of initializing the environment of forked CGI scripts using untrusted HTTP request parameters in the cgiHandler function in cgi.c. When combined with the glibc dynamic linker, this behaviour can be abused for remote code execution using special parameter names such as LD_PRELOAD. An attacker can POST their shared object payload in the body of the request, and reference it using /proc/self/fd/0. Embedthis GoAhead Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Embedthis GoAhead is prone to a remote code execution vulnerability. An attacker can exploit this issue to execute arbitrary code within the context of the application. Failed exploit attempts will likely cause a denial-of-service condition. Embedthis GoAhead is an embedded Web server of American Embedthis software company. A security vulnerability exists in versions of Embedthis GoAhead prior to 3.6.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201712-0864", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "goahead", "scope": "lt", "trust": 1.8, "vendor": "embedthis", "version": "3.6.5" }, { "model": "integrated lights out manager", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "4.0" }, { "model": "integrated lights out manager", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "3.0" }, { "model": "goahead", "scope": "eq", "trust": 0.6, "vendor": "embedthis", "version": "3.3.6" }, { "model": "goahead", "scope": "eq", "trust": 0.6, "vendor": "embedthis", "version": "3.3.5" }, { "model": "goahead", "scope": "eq", "trust": 0.6, "vendor": "embedthis", "version": "3.3.2" }, { "model": "goahead", "scope": "eq", "trust": 0.6, "vendor": "embedthis", "version": "3.3.3" }, { "model": "goahead", "scope": "eq", "trust": 0.6, "vendor": "embedthis", "version": "3.3.4" }, { "model": "goahead", "scope": "eq", "trust": 0.6, "vendor": "embedthis", "version": "3.4.0" }, { "model": "goahead", "scope": "eq", "trust": 0.6, "vendor": "embedthis", "version": "3.0.0" }, { "model": "goahead", "scope": "eq", "trust": 0.6, "vendor": "embedthis", "version": "3.3.1" }, { "model": "software goahead", "scope": "eq", "trust": 0.3, "vendor": "embedthis", "version": "3.6.4" }, { "model": "software goahead", "scope": "ne", "trust": 0.3, "vendor": "embedthis", "version": "3.6.5" } ], "sources": [ { "db": "BID", "id": "103913" }, { "db": "JVNDB", "id": "JVNDB-2017-011723" }, { "db": "CNNVD", "id": "CNNVD-201712-407" }, { "db": "NVD", "id": "CVE-2017-17562" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:embedthis:goahead", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-011723" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Reid Wightman of Dragos reported these vulnerabilities to GE.", "sources": [ { "db": "CNNVD", "id": "CNNVD-201712-407" } ], "trust": 0.6 }, "cve": "CVE-2017-17562", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2017-17562", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-108597", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "id": "CVE-2017-17562", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.1, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2017-17562", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-17562", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2017-17562", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201712-407", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-108597", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2017-17562", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-108597" }, { "db": "VULMON", "id": "CVE-2017-17562" }, { "db": "JVNDB", "id": "JVNDB-2017-011723" }, { "db": "CNNVD", "id": "CNNVD-201712-407" }, { "db": "NVD", "id": "CVE-2017-17562" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Embedthis GoAhead before 3.6.5 allows remote code execution if CGI is enabled and a CGI program is dynamically linked. This is a result of initializing the environment of forked CGI scripts using untrusted HTTP request parameters in the cgiHandler function in cgi.c. When combined with the glibc dynamic linker, this behaviour can be abused for remote code execution using special parameter names such as LD_PRELOAD. An attacker can POST their shared object payload in the body of the request, and reference it using /proc/self/fd/0. Embedthis GoAhead Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Embedthis GoAhead is prone to a remote code execution vulnerability. \nAn attacker can exploit this issue to execute arbitrary code within the context of the application. Failed exploit attempts will likely cause a denial-of-service condition. Embedthis GoAhead is an embedded Web server of American Embedthis software company. A security vulnerability exists in versions of Embedthis GoAhead prior to 3.6.5", "sources": [ { "db": "NVD", "id": "CVE-2017-17562" }, { "db": "JVNDB", "id": "JVNDB-2017-011723" }, { "db": "BID", "id": "103913" }, { "db": "VULHUB", "id": "VHN-108597" }, { "db": "VULMON", "id": "CVE-2017-17562" } ], "trust": 2.07 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=43877", "trust": 0.2, "type": "exploit" }, { "reference": "https://www.scap.org.cn/vuln/vhn-108597", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-108597" }, { "db": "VULMON", "id": "CVE-2017-17562" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-17562", "trust": 2.9 }, { "db": "EXPLOIT-DB", "id": "43877", "trust": 1.1 }, { "db": "EXPLOIT-DB", "id": "43360", "trust": 1.1 }, { "db": "SECTRACK", "id": "1040702", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2017-011723", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201712-407", "trust": 0.7 }, { "db": "ICS CERT", "id": "ICSA-22-090-06", "trust": 0.6 }, { "db": "BID", "id": "103913", "trust": 0.4 }, { "db": "PACKETSTORM", "id": "146061", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145471", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-96997", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-108597", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2017-17562", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-108597" }, { "db": "VULMON", "id": "CVE-2017-17562" }, { "db": "BID", "id": "103913" }, { "db": "JVNDB", "id": "JVNDB-2017-011723" }, { "db": "CNNVD", "id": "CNNVD-201712-407" }, { "db": "NVD", "id": "CVE-2017-17562" } ] }, "id": "VAR-201712-0864", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-108597" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:53:15.038000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "DEV: add CGI prefixes", "trust": 0.8, "url": "https://github.com/embedthis/goahead/commit/6f786c123196eb622625a920d54048629a7caa74" }, { "title": "CGI environment variables need a prefix #249", "trust": 0.8, "url": "https://github.com/embedthis/goahead/issues/249" }, { "title": "Embedthis GoAhead Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=77116" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - April 2018", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=4019ca77f50c7a34e4d97833e6f3321e" }, { "title": "CVE-2017-17562", "trust": 0.1, "url": "https://github.com/ivanitlearning/CVE-2017-17562 " }, { "title": "Goahead-CVE-2017-17562", "trust": 0.1, "url": "https://github.com/crispy-peppers/Goahead-CVE-2017-17562 " }, { "title": "GoAhead-cve---2017--17562", "trust": 0.1, "url": "https://github.com/cyberharsh/GoAhead-cve---2017--17562 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-17562" }, { "db": "JVNDB", "id": "JVNDB-2017-011723" }, { "db": "CNNVD", "id": "CNNVD-201712-407" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-108597" }, { "db": "JVNDB", "id": "JVNDB-2017-011723" }, { "db": "NVD", "id": "CVE-2017-17562" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.4, "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" }, { "trust": 1.4, "url": "https://github.com/embedthis/goahead/commit/6f786c123196eb622625a920d54048629a7caa74" }, { "trust": 1.4, "url": "https://github.com/embedthis/goahead/issues/249" }, { "trust": 1.1, "url": "https://www.exploit-db.com/exploits/43360/" }, { "trust": 1.1, "url": "https://www.exploit-db.com/exploits/43877/" }, { "trust": 1.1, "url": "https://github.com/elttam/advisories/tree/master/cve-2017-17562" }, { "trust": 1.1, "url": "https://www.elttam.com.au/blog/goahead/" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1040702" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-17562" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-17562" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-090-06" }, { "trust": 0.3, "url": "http://embedthis.com/products/goahead/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-108597" }, { "db": "BID", "id": "103913" }, { "db": "JVNDB", "id": "JVNDB-2017-011723" }, { "db": "CNNVD", "id": "CNNVD-201712-407" }, { "db": "NVD", "id": "CVE-2017-17562" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-108597" }, { "db": "VULMON", "id": "CVE-2017-17562" }, { "db": "BID", "id": "103913" }, { "db": "JVNDB", "id": "JVNDB-2017-011723" }, { "db": "CNNVD", "id": "CNNVD-201712-407" }, { "db": "NVD", "id": "CVE-2017-17562" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-12-12T00:00:00", "db": "VULHUB", "id": "VHN-108597" }, { "date": "2017-12-12T00:00:00", "db": "VULMON", "id": "CVE-2017-17562" }, { "date": "2017-12-12T00:00:00", "db": "BID", "id": "103913" }, { "date": "2018-01-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-011723" }, { "date": "2017-12-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201712-407" }, { "date": "2017-12-12T19:29:00.207000", "db": "NVD", "id": "CVE-2017-17562" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-04-20T00:00:00", "db": "VULHUB", "id": "VHN-108597" }, { "date": "2018-04-20T00:00:00", "db": "VULMON", "id": "CVE-2017-17562" }, { "date": "2017-12-12T00:00:00", "db": "BID", "id": "103913" }, { "date": "2018-01-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-011723" }, { "date": "2022-04-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201712-407" }, { "date": "2024-11-21T03:18:10.290000", "db": "NVD", "id": "CVE-2017-17562" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201712-407" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Embedthis GoAhead Input validation vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-011723" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Input Validation Error", "sources": [ { "db": "BID", "id": "103913" }, { "db": "CNNVD", "id": "CNNVD-201712-407" } ], "trust": 0.9 } }
var-202110-0318
Vulnerability from variot
An issue was discovered in GoAhead 4.x and 5.x before 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerable CGI scripts. GoAhead Contains a vulnerability related to unlimited uploads of dangerous types of files.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. GoAhead is an open source small embedded Web server from Embedthis Software in the United States. GoAhead has a file upload vulnerability, which stems from incomplete filtering in the file upload filter
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-0318", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "goahead", "scope": "lt", "trust": 1.0, "vendor": "embedthis", "version": "5.1.5" }, { "model": "goahead", "scope": "gte", "trust": 1.0, "vendor": "embedthis", "version": "5.0.0" }, { "model": "goahead", "scope": "gte", "trust": 1.0, "vendor": "embedthis", "version": "4.0.0" }, { "model": "goahead", "scope": "lte", "trust": 1.0, "vendor": "embedthis", "version": "4.1.3" }, { "model": "goahead", "scope": "lt", "trust": 0.8, "vendor": "embedthis", "version": "4.x 5.x" }, { "model": "goahead", "scope": "eq", "trust": 0.8, "vendor": "embedthis", "version": null }, { "model": "goahead", "scope": "eq", "trust": 0.8, "vendor": "embedthis", "version": "5.1.5" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-013755" }, { "db": "NVD", "id": "CVE-2021-42342" } ] }, "cve": "CVE-2021-42342", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-42342", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-403427", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2021-42342", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-42342", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-42342", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2021-42342", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202110-1020", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-403427", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-42342", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-403427" }, { "db": "VULMON", "id": "CVE-2021-42342" }, { "db": "JVNDB", "id": "JVNDB-2021-013755" }, { "db": "CNNVD", "id": "CNNVD-202110-1020" }, { "db": "NVD", "id": "CVE-2021-42342" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered in GoAhead 4.x and 5.x before 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerable CGI scripts. GoAhead Contains a vulnerability related to unlimited uploads of dangerous types of files.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. GoAhead is an open source small embedded Web server from Embedthis Software in the United States. GoAhead has a file upload vulnerability, which stems from incomplete filtering in the file upload filter", "sources": [ { "db": "NVD", "id": "CVE-2021-42342" }, { "db": "JVNDB", "id": "JVNDB-2021-013755" }, { "db": "VULHUB", "id": "VHN-403427" }, { "db": "VULMON", "id": "CVE-2021-42342" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-42342", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-013755", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-1020", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-102061", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-403427", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-42342", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-403427" }, { "db": "VULMON", "id": "CVE-2021-42342" }, { "db": "JVNDB", "id": "JVNDB-2021-013755" }, { "db": "CNNVD", "id": "CNNVD-202110-1020" }, { "db": "NVD", "id": "CVE-2021-42342" } ] }, "id": "VAR-202110-0318", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-403427" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:57:56.152000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Upload\u00a0form\u00a0vars\u00a0bypass\u00a0CGI\u00a0prefixing.\u00a0#305", "trust": 0.8, "url": "https://github.com/embedthis/goahead/issues/305" }, { "title": "CVE-2021-42342", "trust": 0.1, "url": "https://github.com/Mr-xn/CVE-2021-42342 " }, { "title": "goahead-webserver-pre-5.1.5-RCE-PoC-CVE-2021-42342-", "trust": 0.1, "url": "https://github.com/kimusan/goahead-webserver-pre-5.1.5-RCE-PoC-CVE-2021-42342- " } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-42342" }, { "db": "JVNDB", "id": "JVNDB-2021-013755" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-434", "trust": 1.1 }, { "problemtype": "Unlimited uploads of dangerous types of files (CWE-434) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-403427" }, { "db": "JVNDB", "id": "JVNDB-2021-013755" }, { "db": "NVD", "id": "CVE-2021-42342" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://github.com/embedthis/goahead/issues/305" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-42342" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/434.html" }, { "trust": 0.1, "url": "https://github.com/mr-xn/cve-2021-42342" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-403427" }, { "db": "VULMON", "id": "CVE-2021-42342" }, { "db": "JVNDB", "id": "JVNDB-2021-013755" }, { "db": "CNNVD", "id": "CNNVD-202110-1020" }, { "db": "NVD", "id": "CVE-2021-42342" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-403427" }, { "db": "VULMON", "id": "CVE-2021-42342" }, { "db": "JVNDB", "id": "JVNDB-2021-013755" }, { "db": "CNNVD", "id": "CNNVD-202110-1020" }, { "db": "NVD", "id": "CVE-2021-42342" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-14T00:00:00", "db": "VULHUB", "id": "VHN-403427" }, { "date": "2021-10-14T00:00:00", "db": "VULMON", "id": "CVE-2021-42342" }, { "date": "2022-09-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-013755" }, { "date": "2021-10-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-1020" }, { "date": "2021-10-14T06:15:07.037000", "db": "NVD", "id": "CVE-2021-42342" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-20T00:00:00", "db": "VULHUB", "id": "VHN-403427" }, { "date": "2021-10-20T00:00:00", "db": "VULMON", "id": "CVE-2021-42342" }, { "date": "2022-09-27T07:24:00", "db": "JVNDB", "id": "JVNDB-2021-013755" }, { "date": "2021-10-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-1020" }, { "date": "2024-11-21T06:27:38.790000", "db": "NVD", "id": "CVE-2021-42342" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-1020" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "GoAhead\u00a0 Vulnerability in unlimited upload of dangerous types of files in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-013755" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-1020" } ], "trust": 0.6 } }
cve-2017-14149
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://github.com/shadow4u/goaheaddebug/blob/master/README.md | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:20:41.283Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/shadow4u/goaheaddebug/blob/master/README.md" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "GoAhead 3.4.0 through 3.6.5 has a NULL Pointer Dereference in the websDecodeUrl function in http.c, leading to a crash for a \"POST / HTTP/1.1\" request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-05T07:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/shadow4u/goaheaddebug/blob/master/README.md" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-14149", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GoAhead 3.4.0 through 3.6.5 has a NULL Pointer Dereference in the websDecodeUrl function in http.c, leading to a crash for a \"POST / HTTP/1.1\" request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/shadow4u/goaheaddebug/blob/master/README.md", "refsource": "MISC", "url": "https://github.com/shadow4u/goaheaddebug/blob/master/README.md" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-14149", "datePublished": "2017-09-05T07:00:00Z", "dateReserved": "2017-09-05T00:00:00Z", "dateUpdated": "2024-09-16T18:55:35.449Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-5096
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0888 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:47:55.928Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0888" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EmbedThis", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EmbedThis GoAhead Web Server v5.0.1 EmbedThis GoAhead Web Server v4.1.1 EmbedThis GoAhead Web Server v3.6.5" } ] } ], "descriptions": [ { "lang": "en", "value": "An exploitable code execution vulnerability exists in the processing of multi-part/form-data requests within the base GoAhead web server application in versions v5.0.1, v.4.1.1 and v3.6.5. A specially crafted HTTP request can lead to a use-after-free condition during the processing of this request that can be used to corrupt heap structures that could lead to full code execution. The request can be unauthenticated in the form of GET or POST requests, and does not require the requested resource to exist on the server." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416: Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-19T17:34:08", "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "shortName": "talos" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0888" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "talos-cna@cisco.com", "ID": "CVE-2019-5096", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EmbedThis", "version": { "version_data": [ { "version_value": "EmbedThis GoAhead Web Server v5.0.1 EmbedThis GoAhead Web Server v4.1.1 EmbedThis GoAhead Web Server v3.6.5" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An exploitable code execution vulnerability exists in the processing of multi-part/form-data requests within the base GoAhead web server application in versions v5.0.1, v.4.1.1 and v3.6.5. A specially crafted HTTP request can lead to a use-after-free condition during the processing of this request that can be used to corrupt heap structures that could lead to full code execution. The request can be unauthenticated in the form of GET or POST requests, and does not require the requested resource to exist on the server." } ] }, "impact": { "cvss": { "baseScore": 9.8, "baseSeverity": "Critical", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-416: Use After Free" } ] } ] }, "references": { "reference_data": [ { "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0888", "refsource": "MISC", "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0888" } ] } } } }, "cveMetadata": { "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "assignerShortName": "talos", "cveId": "CVE-2019-5096", "datePublished": "2019-12-03T21:52:15", "dateReserved": "2019-01-04T00:00:00", "dateUpdated": "2024-08-04T19:47:55.928Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-3184
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-3184", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-17T14:42:03.408687Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-17T14:42:12.325Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "GoAhead", "repo": "https://www.embedthis.com/goahead/download.html", "vendor": "EmbedThis", "versions": [ { "lessThanOrEqual": "6.0.0", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Diego Zaffaroni of Nozomi Networks found this bug during a security research activity." } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Multiple CWE-476 NULL Pointer Dereference vulnerabilities were found in GoAhead Web Server up to version 6.0.0 when compiled with the ME_GOAHEAD_REPLACE_MALLOC flag. Without a memory notifier for allocation failures, remote attackers can exploit these vulnerabilities by sending malicious requests, leading to a crash and Denial of Service (DoS)." } ], "value": "Multiple CWE-476 NULL Pointer Dereference vulnerabilities were found in GoAhead Web Server up to version 6.0.0 when compiled with the ME_GOAHEAD_REPLACE_MALLOC flag. Without a memory notifier for allocation failures, remote attackers can exploit these vulnerabilities by sending malicious requests, leading to a crash and Denial of Service (DoS)." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-17T07:32:18.369Z", "orgId": "bec8025f-a851-46e5-b3a3-058e6b0aa23c", "shortName": "Nozomi" }, "references": [ { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-3184" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "It is recommended to apply fixes introduced in version 6.0.1 of GoAhead and use the latest version available as base for building custom web servers." } ], "value": "It is recommended to apply fixes introduced in version 6.0.1 of GoAhead and use the latest version available as base for building custom web servers." } ], "source": { "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "bec8025f-a851-46e5-b3a3-058e6b0aa23c", "assignerShortName": "Nozomi", "cveId": "CVE-2024-3184", "datePublished": "2024-10-17T07:32:18.369Z", "dateReserved": "2024-04-02T10:32:53.912Z", "dateUpdated": "2024-10-17T14:42:12.325Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-41615
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:15:29.009Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://devel.rtems.org/browser/rtems/cpukit/httpd/websda.c?rev=c1427d2758079f0e9dd6a8de1662d78e0d6bc4ca" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/trenta3/goahead-versions/blob/master/2.1.8/230165webs218.tar.gz?raw=true" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "websda.c in GoAhead WebServer 2.1.8 has insufficient nonce entropy because the nonce calculation relies on the hardcoded onceuponatimeinparadise value, which does not follow the secret-data guideline for HTTP Digest Access Authentication in RFC 7616 section 3.3 (or RFC 2617 section 3.2.1). NOTE: 2.1.8 is a version from 2003; however, the affected websda.c code appears in multiple derivative works that may be used in 2021. Recent GoAhead software is unaffected." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-08T18:26:11", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://devel.rtems.org/browser/rtems/cpukit/httpd/websda.c?rev=c1427d2758079f0e9dd6a8de1662d78e0d6bc4ca" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/trenta3/goahead-versions/blob/master/2.1.8/230165webs218.tar.gz?raw=true" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-41615", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "websda.c in GoAhead WebServer 2.1.8 has insufficient nonce entropy because the nonce calculation relies on the hardcoded onceuponatimeinparadise value, which does not follow the secret-data guideline for HTTP Digest Access Authentication in RFC 7616 section 3.3 (or RFC 2617 section 3.2.1). NOTE: 2.1.8 is a version from 2003; however, the affected websda.c code appears in multiple derivative works that may be used in 2021. Recent GoAhead software is unaffected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://devel.rtems.org/browser/rtems/cpukit/httpd/websda.c?rev=c1427d2758079f0e9dd6a8de1662d78e0d6bc4ca", "refsource": "MISC", "url": "https://devel.rtems.org/browser/rtems/cpukit/httpd/websda.c?rev=c1427d2758079f0e9dd6a8de1662d78e0d6bc4ca" }, { "name": "https://github.com/trenta3/goahead-versions/blob/master/2.1.8/230165webs218.tar.gz?raw=true", "refsource": "MISC", "url": "https://github.com/trenta3/goahead-versions/blob/master/2.1.8/230165webs218.tar.gz?raw=true" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-41615", "datePublished": "2022-08-08T18:26:11", "dateReserved": "2021-09-25T00:00:00", "dateUpdated": "2024-08-04T03:15:29.009Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-9707
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://github.com/embedthis/goahead/issues/106 | x_refsource_CONFIRM | |
http://seclists.org/fulldisclosure/2015/Mar/157 | mailing-list, x_refsource_FULLDISC | |
https://github.com/embedthis/goahead/commit/eed4a7d177bf94a54c7b06ccce88507fbd76fb77 | x_refsource_CONFIRM | |
http://packetstormsecurity.com/files/131156/GoAhead-3.4.1-Heap-Overflow-Traversal.html | x_refsource_MISC | |
http://www.securitytracker.com/id/1032208 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/archive/1/535027/100/0/threaded | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:55:05.082Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/embedthis/goahead/issues/106" }, { "name": "20150328 Advisory: CVE-2014-9707: GoAhead Web Server 3.0.0 - 3.4.1", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2015/Mar/157" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/embedthis/goahead/commit/eed4a7d177bf94a54c7b06ccce88507fbd76fb77" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/131156/GoAhead-3.4.1-Heap-Overflow-Traversal.html" }, { "name": "1032208", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032208" }, { "name": "20150328 Advisory: CVE-2014-9707: GoAhead Web Server 3.0.0 - 3.4.1", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/535027/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-11-24T00:00:00", "descriptions": [ { "lang": "en", "value": "EmbedThis GoAhead 3.0.0 through 3.4.1 does not properly handle path segments starting with a . (dot), which allows remote attackers to conduct directory traversal attacks, cause a denial of service (heap-based buffer overflow and crash), or possibly execute arbitrary code via a crafted URI." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/embedthis/goahead/issues/106" }, { "name": "20150328 Advisory: CVE-2014-9707: GoAhead Web Server 3.0.0 - 3.4.1", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2015/Mar/157" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/embedthis/goahead/commit/eed4a7d177bf94a54c7b06ccce88507fbd76fb77" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/131156/GoAhead-3.4.1-Heap-Overflow-Traversal.html" }, { "name": "1032208", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032208" }, { "name": "20150328 Advisory: CVE-2014-9707: GoAhead Web Server 3.0.0 - 3.4.1", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/535027/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-9707", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "EmbedThis GoAhead 3.0.0 through 3.4.1 does not properly handle path segments starting with a . (dot), which allows remote attackers to conduct directory traversal attacks, cause a denial of service (heap-based buffer overflow and crash), or possibly execute arbitrary code via a crafted URI." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/embedthis/goahead/issues/106", "refsource": "CONFIRM", "url": "https://github.com/embedthis/goahead/issues/106" }, { "name": "20150328 Advisory: CVE-2014-9707: GoAhead Web Server 3.0.0 - 3.4.1", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2015/Mar/157" }, { "name": "https://github.com/embedthis/goahead/commit/eed4a7d177bf94a54c7b06ccce88507fbd76fb77", "refsource": "CONFIRM", "url": "https://github.com/embedthis/goahead/commit/eed4a7d177bf94a54c7b06ccce88507fbd76fb77" }, { "name": "http://packetstormsecurity.com/files/131156/GoAhead-3.4.1-Heap-Overflow-Traversal.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/131156/GoAhead-3.4.1-Heap-Overflow-Traversal.html" }, { "name": "1032208", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032208" }, { "name": "20150328 Advisory: CVE-2014-9707: GoAhead Web Server 3.0.0 - 3.4.1", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/535027/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-9707", "datePublished": "2015-03-31T14:00:00", "dateReserved": "2015-03-23T00:00:00", "dateUpdated": "2024-08-06T13:55:05.082Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-5674
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.cybereason.com/zero-day-exploits-turn-hundreds-of-thousands-of-ip-cameras-into-iot-botnet-slaves/ | x_refsource_MISC | |
https://www.cybereason.com/cve-ip-cameras/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:11:48.344Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.cybereason.com/zero-day-exploits-turn-hundreds-of-thousands-of-ip-cameras-into-iot-botnet-slaves/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.cybereason.com/cve-ip-cameras/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in a custom-built GoAhead web server used on Foscam, Vstarcam, and multiple white-label IP camera models allows an attacker to craft a malformed HTTP (\"GET system.ini HTTP/1.1\\n\\n\" - note the lack of \"/\" in the path field of the request) request that will disclose the configuration file with the login password." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-03-13T06:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.cybereason.com/zero-day-exploits-turn-hundreds-of-thousands-of-ip-cameras-into-iot-botnet-slaves/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.cybereason.com/cve-ip-cameras/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-5674", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in a custom-built GoAhead web server used on Foscam, Vstarcam, and multiple white-label IP camera models allows an attacker to craft a malformed HTTP (\"GET system.ini HTTP/1.1\\n\\n\" - note the lack of \"/\" in the path field of the request) request that will disclose the configuration file with the login password." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cybereason.com/zero-day-exploits-turn-hundreds-of-thousands-of-ip-cameras-into-iot-botnet-slaves/", "refsource": "MISC", "url": "https://www.cybereason.com/zero-day-exploits-turn-hundreds-of-thousands-of-ip-cameras-into-iot-botnet-slaves/" }, { "name": "https://www.cybereason.com/cve-ip-cameras/", "refsource": "MISC", "url": "https://www.cybereason.com/cve-ip-cameras/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-5674", "datePublished": "2017-03-13T06:14:00", "dateReserved": "2017-01-31T00:00:00", "dateUpdated": "2024-08-05T15:11:48.344Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-42342
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://github.com/embedthis/goahead/issues/305 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:30:38.334Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/embedthis/goahead/issues/305" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in GoAhead 4.x and 5.x before 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerable CGI scripts." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-14T05:08:37", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/embedthis/goahead/issues/305" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-42342", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in GoAhead 4.x and 5.x before 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerable CGI scripts." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/embedthis/goahead/issues/305", "refsource": "MISC", "url": "https://github.com/embedthis/goahead/issues/305" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-42342", "datePublished": "2021-10-14T05:08:38", "dateReserved": "2021-10-14T00:00:00", "dateUpdated": "2024-08-04T03:30:38.334Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-15504
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T09:54:03.563Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/embedthis/appweb/commit/66067ae6d1fa08b37a270e7dc1821df52ed2daef" }, { "tags": [ "x_transferred" ], "url": "https://github.com/embedthis/appweb/issues/605" }, { "tags": [ "x_transferred" ], "url": "https://github.com/embedthis/goahead/issues/264" }, { "tags": [ "x_transferred" ], "url": "https://supportportal.juniper.net/s/article/2021-07-Security-Bulletin-Junos-OS-Multiple-J-Web-vulnerabilities-resolved" }, { "tags": [ "x_transferred" ], "url": "https://supportportal.juniper.net/s/article/2019-07-Security-Bulletin-Junos-OS-J-Web-Denial-of-Service-due-to-multiple-vulnerabilities-in-Embedthis-Appweb-Server" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-08-17T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. The server mishandles some HTTP request fields associated with time, which results in a NULL pointer dereference, as demonstrated by If-Modified-Since or If-Unmodified-Since with a month greater than 11." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-13T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://github.com/embedthis/appweb/commit/66067ae6d1fa08b37a270e7dc1821df52ed2daef" }, { "url": "https://github.com/embedthis/appweb/issues/605" }, { "url": "https://github.com/embedthis/goahead/issues/264" }, { "url": "https://supportportal.juniper.net/s/article/2021-07-Security-Bulletin-Junos-OS-Multiple-J-Web-vulnerabilities-resolved" }, { "url": "https://supportportal.juniper.net/s/article/2019-07-Security-Bulletin-Junos-OS-J-Web-Denial-of-Service-due-to-multiple-vulnerabilities-in-Embedthis-Appweb-Server" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-15504", "datePublished": "2018-08-18T00:00:00", "dateReserved": "2018-08-17T00:00:00", "dateUpdated": "2024-08-05T09:54:03.563Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-5675
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.cybereason.com/zero-day-exploits-turn-hundreds-of-thousands-of-ip-cameras-into-iot-botnet-slaves/ | x_refsource_MISC | |
https://www.cybereason.com/cve-ip-cameras/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:11:48.410Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.cybereason.com/zero-day-exploits-turn-hundreds-of-thousands-of-ip-cameras-into-iot-botnet-slaves/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.cybereason.com/cve-ip-cameras/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "A command-injection vulnerability exists in a web application on a custom-built GoAhead web server used on Foscam, Vstarcam, and multiple white-label IP camera models. The mail-sending form in the mail.htm page allows an attacker to inject a command into the receiver1 field in the form; it will be executed with root privileges." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-03-13T06:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.cybereason.com/zero-day-exploits-turn-hundreds-of-thousands-of-ip-cameras-into-iot-botnet-slaves/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.cybereason.com/cve-ip-cameras/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-5675", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A command-injection vulnerability exists in a web application on a custom-built GoAhead web server used on Foscam, Vstarcam, and multiple white-label IP camera models. The mail-sending form in the mail.htm page allows an attacker to inject a command into the receiver1 field in the form; it will be executed with root privileges." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cybereason.com/zero-day-exploits-turn-hundreds-of-thousands-of-ip-cameras-into-iot-botnet-slaves/", "refsource": "MISC", "url": "https://www.cybereason.com/zero-day-exploits-turn-hundreds-of-thousands-of-ip-cameras-into-iot-botnet-slaves/" }, { "name": "https://www.cybereason.com/cve-ip-cameras/", "refsource": "MISC", "url": "https://www.cybereason.com/cve-ip-cameras/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-5675", "datePublished": "2017-03-13T06:14:00", "dateReserved": "2017-01-31T00:00:00", "dateUpdated": "2024-08-05T15:11:48.410Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-12822
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://github.com/embedthis/goahead/issues/285 | x_refsource_MISC | |
https://github.com/embedthis/goahead/compare/5349710...579f21f | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:32:55.347Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/embedthis/goahead/issues/285" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/embedthis/goahead/compare/5349710...579f21f" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In http.c in Embedthis GoAhead before 4.1.1 and 5.x before 5.0.1, a header parsing vulnerability causes a memory assertion, out-of-bounds memory reference, and potential DoS, as demonstrated by a colon on a line by itself." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-14T13:06:56", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/embedthis/goahead/issues/285" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/embedthis/goahead/compare/5349710...579f21f" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-12822", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In http.c in Embedthis GoAhead before 4.1.1 and 5.x before 5.0.1, a header parsing vulnerability causes a memory assertion, out-of-bounds memory reference, and potential DoS, as demonstrated by a colon on a line by itself." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/embedthis/goahead/issues/285", "refsource": "MISC", "url": "https://github.com/embedthis/goahead/issues/285" }, { "name": "https://github.com/embedthis/goahead/compare/5349710...579f21f", "refsource": "MISC", "url": "https://github.com/embedthis/goahead/compare/5349710...579f21f" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-12822", "datePublished": "2019-06-14T13:06:56", "dateReserved": "2019-06-14T00:00:00", "dateUpdated": "2024-08-04T23:32:55.347Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-15505
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T09:54:03.616Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/embedthis/appweb/issues/605" }, { "tags": [ "x_transferred" ], "url": "https://github.com/embedthis/goahead/issues/264" }, { "tags": [ "x_transferred" ], "url": "https://github.com/embedthis/appweb/commit/16e6979c82297d5fc4f8661e7ada975f51e4dfa9" }, { "tags": [ "x_transferred" ], "url": "https://supportportal.juniper.net/s/article/2021-07-Security-Bulletin-Junos-OS-Multiple-J-Web-vulnerabilities-resolved?language=en_US" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-08-17T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. An HTTP POST request with a specially crafted \"Host\" header field may cause a NULL pointer dereference and thus cause a denial of service, as demonstrated by the lack of a trailing \u0027]\u0027 character in an IPv6 address." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-13T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://github.com/embedthis/appweb/issues/605" }, { "url": "https://github.com/embedthis/goahead/issues/264" }, { "url": "https://github.com/embedthis/appweb/commit/16e6979c82297d5fc4f8661e7ada975f51e4dfa9" }, { "url": "https://supportportal.juniper.net/s/article/2021-07-Security-Bulletin-Junos-OS-Multiple-J-Web-vulnerabilities-resolved?language=en_US" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-15505", "datePublished": "2018-08-18T00:00:00", "dateReserved": "2018-08-17T00:00:00", "dateUpdated": "2024-08-05T09:54:03.616Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-16645
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:17:41.124Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Ramikan/Vulnerabilities/blob/master/GoAhead%20Web%20server%20HTTP%20Header%20Injection" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/154652/GoAhead-2.5.0-Host-Header-Injection.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Embedthis GoAhead 2.5.0. Certain pages (such as goform/login and config/log_off_page.htm) create links containing a hostname obtained from an arbitrary HTTP Host header sent by an attacker. This could potentially be used in a phishing attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-01T22:06:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Ramikan/Vulnerabilities/blob/master/GoAhead%20Web%20server%20HTTP%20Header%20Injection" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/154652/GoAhead-2.5.0-Host-Header-Injection.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-16645", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Embedthis GoAhead 2.5.0. Certain pages (such as goform/login and config/log_off_page.htm) create links containing a hostname obtained from an arbitrary HTTP Host header sent by an attacker. This could potentially be used in a phishing attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Ramikan/Vulnerabilities/blob/master/GoAhead%20Web%20server%20HTTP%20Header%20Injection", "refsource": "MISC", "url": "https://github.com/Ramikan/Vulnerabilities/blob/master/GoAhead%20Web%20server%20HTTP%20Header%20Injection" }, { "name": "http://packetstormsecurity.com/files/154652/GoAhead-2.5.0-Host-Header-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/154652/GoAhead-2.5.0-Host-Header-Injection.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-16645", "datePublished": "2019-09-20T18:24:15", "dateReserved": "2019-09-20T00:00:00", "dateUpdated": "2024-08-05T01:17:41.124Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-43298
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://github.com/embedthis/goahead/issues/304 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:55:28.938Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/embedthis/goahead/issues/304" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "goahead", "vendor": "embedthis", "versions": [ { "lessThan": "5.1.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "The code that performs password matching when using \u0027Basic\u0027 HTTP authentication does not use a constant-time memcmp and has no rate-limiting. This means that an unauthenticated network attacker can brute-force the HTTP basic password, byte-by-byte, by recording the webserver\u0027s response time until the unauthorized (401) response." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-208", "description": "CWE-208", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-25T19:11:17", "orgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "shortName": "JFROG" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/embedthis/goahead/issues/304" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@jfrog.com", "ID": "CVE-2021-43298", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "goahead", "version": { "version_data": [ { "platform": "", "version_affected": "\u003c", "version_name": "", "version_value": "5.1.4" } ] } } ] }, "vendor_name": "embedthis" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The code that performs password matching when using \u0027Basic\u0027 HTTP authentication does not use a constant-time memcmp and has no rate-limiting. This means that an unauthenticated network attacker can brute-force the HTTP basic password, byte-by-byte, by recording the webserver\u0027s response time until the unauthorized (401) response." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-208" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/embedthis/goahead/issues/304", "refsource": "MISC", "url": "https://github.com/embedthis/goahead/issues/304" } ] } } } }, "cveMetadata": { "assignerOrgId": "48a46f29-ae42-4e1d-90dd-c1676c1e5e6d", "assignerShortName": "JFROG", "cveId": "CVE-2021-43298", "datePublished": "2022-01-25T19:11:17", "dateReserved": "2021-11-03T00:00:00", "dateUpdated": "2024-08-04T03:55:28.938Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-1000471
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://github.com/embedthis/goahead/pull/258 | x_refsource_MISC | |
https://github.com/embedthis/goahead/commit/5e6be61e42448f503e75e287dc332b1ecbf2a665#diff-7c9c60c790648b06210f57b9e2f53ca7 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:00:41.530Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/embedthis/goahead/pull/258" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/embedthis/goahead/commit/5e6be61e42448f503e75e287dc332b1ecbf2a665#diff-7c9c60c790648b06210f57b9e2f53ca7" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "dateAssigned": "2017-12-29T00:00:00", "descriptions": [ { "lang": "en", "value": "EmbedThis GoAhead Webserver version 4.0.0 is vulnerable to a NULL pointer dereference in the CGI handler resulting in memory corruption or denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-03T20:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/embedthis/goahead/pull/258" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/embedthis/goahead/commit/5e6be61e42448f503e75e287dc332b1ecbf2a665#diff-7c9c60c790648b06210f57b9e2f53ca7" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "DATE_ASSIGNED": "2017-12-29", "ID": "CVE-2017-1000471", "REQUESTER": "rwightman@dragos.com", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "EmbedThis GoAhead Webserver version 4.0.0 is vulnerable to a NULL pointer dereference in the CGI handler resulting in memory corruption or denial of service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/embedthis/goahead/pull/258", "refsource": "MISC", "url": "https://github.com/embedthis/goahead/pull/258" }, { "name": "https://github.com/embedthis/goahead/commit/5e6be61e42448f503e75e287dc332b1ecbf2a665#diff-7c9c60c790648b06210f57b9e2f53ca7", "refsource": "MISC", "url": "https://github.com/embedthis/goahead/commit/5e6be61e42448f503e75e287dc332b1ecbf2a665#diff-7c9c60c790648b06210f57b9e2f53ca7" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-1000471", "datePublished": "2018-01-03T20:00:00Z", "dateReserved": "2018-01-03T00:00:00Z", "dateUpdated": "2024-09-16T18:12:44.834Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-3187
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-3187", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-17T14:40:32.549079Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-17T14:40:42.458Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "GoAhead", "repo": "https://www.embedthis.com/goahead/download.html", "vendor": "EmbedThis", "versions": [ { "lessThanOrEqual": "6.0.0", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Diego Zaffaroni of Nozomi Networks found this bug during a security research activity." } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "This issue tracks two CWE-416 Use After Free (UAF) and one CWE-415 Double Free vulnerabilities in Goahead versions \u0026lt;= 6.0.0. These are caused by JST values not being nulled when freed during parsing of JST templates. If the ME_GOAHEAD_JAVASCRIPT flag is enabled, a remote attacker with the privileges to modify JavaScript template (JST) files could exploit this by providing malicious templates. This may lead to memory corruption, potentially causing a Denial of Service (DoS) or, in rare cases, code execution, though the latter is highly context-dependent." } ], "value": "This issue tracks two CWE-416 Use After Free (UAF) and one CWE-415 Double Free vulnerabilities in Goahead versions \u003c= 6.0.0. These are caused by JST values not being nulled when freed during parsing of JST templates. If the ME_GOAHEAD_JAVASCRIPT flag is enabled, a remote attacker with the privileges to modify JavaScript template (JST) files could exploit this by providing malicious templates. This may lead to memory corruption, potentially causing a Denial of Service (DoS) or, in rare cases, code execution, though the latter is highly context-dependent." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-415", "description": "CWE-415 Double Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-17T07:34:50.960Z", "orgId": "bec8025f-a851-46e5-b3a3-058e6b0aa23c", "shortName": "Nozomi" }, "references": [ { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-3187" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "It is recommended to apply fixes introduced in version 6.0.1 of GoAhead and use the latest version available as base for building custom web servers." } ], "value": "It is recommended to apply fixes introduced in version 6.0.1 of GoAhead and use the latest version available as base for building custom web servers." } ], "source": { "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "bec8025f-a851-46e5-b3a3-058e6b0aa23c", "assignerShortName": "Nozomi", "cveId": "CVE-2024-3187", "datePublished": "2024-10-17T07:34:50.960Z", "dateReserved": "2024-04-02T13:02:32.106Z", "dateUpdated": "2024-10-17T14:40:42.458Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-17562
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://github.com/elttam/advisories/tree/master/CVE-2017-17562 | x_refsource_MISC | |
http://www.securitytracker.com/id/1040702 | vdb-entry, x_refsource_SECTRACK | |
https://www.elttam.com.au/blog/goahead/ | x_refsource_MISC | |
https://www.exploit-db.com/exploits/43360/ | exploit, x_refsource_EXPLOIT-DB | |
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html | x_refsource_CONFIRM | |
https://github.com/embedthis/goahead/commit/6f786c123196eb622625a920d54048629a7caa74 | x_refsource_MISC | |
https://github.com/embedthis/goahead/issues/249 | x_refsource_MISC | |
https://www.exploit-db.com/exploits/43877/ | exploit, x_refsource_EXPLOIT-DB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T20:51:32.399Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/elttam/advisories/tree/master/CVE-2017-17562" }, { "name": "1040702", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040702" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.elttam.com.au/blog/goahead/" }, { "name": "43360", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/43360/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/embedthis/goahead/commit/6f786c123196eb622625a920d54048629a7caa74" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/embedthis/goahead/issues/249" }, { "name": "43877", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/43877/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-12-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Embedthis GoAhead before 3.6.5 allows remote code execution if CGI is enabled and a CGI program is dynamically linked. This is a result of initializing the environment of forked CGI scripts using untrusted HTTP request parameters in the cgiHandler function in cgi.c. When combined with the glibc dynamic linker, this behaviour can be abused for remote code execution using special parameter names such as LD_PRELOAD. An attacker can POST their shared object payload in the body of the request, and reference it using /proc/self/fd/0." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-19T01:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/elttam/advisories/tree/master/CVE-2017-17562" }, { "name": "1040702", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040702" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.elttam.com.au/blog/goahead/" }, { "name": "43360", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/43360/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/embedthis/goahead/commit/6f786c123196eb622625a920d54048629a7caa74" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/embedthis/goahead/issues/249" }, { "name": "43877", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/43877/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-17562", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Embedthis GoAhead before 3.6.5 allows remote code execution if CGI is enabled and a CGI program is dynamically linked. This is a result of initializing the environment of forked CGI scripts using untrusted HTTP request parameters in the cgiHandler function in cgi.c. When combined with the glibc dynamic linker, this behaviour can be abused for remote code execution using special parameter names such as LD_PRELOAD. An attacker can POST their shared object payload in the body of the request, and reference it using /proc/self/fd/0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/elttam/advisories/tree/master/CVE-2017-17562", "refsource": "MISC", "url": "https://github.com/elttam/advisories/tree/master/CVE-2017-17562" }, { "name": "1040702", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040702" }, { "name": "https://www.elttam.com.au/blog/goahead/", "refsource": "MISC", "url": "https://www.elttam.com.au/blog/goahead/" }, { "name": "43360", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/43360/" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" }, { "name": "https://github.com/embedthis/goahead/commit/6f786c123196eb622625a920d54048629a7caa74", "refsource": "MISC", "url": "https://github.com/embedthis/goahead/commit/6f786c123196eb622625a920d54048629a7caa74" }, { "name": "https://github.com/embedthis/goahead/issues/249", "refsource": "MISC", "url": "https://github.com/embedthis/goahead/issues/249" }, { "name": "43877", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/43877/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-17562", "datePublished": "2017-12-12T19:00:00", "dateReserved": "2017-12-12T00:00:00", "dateUpdated": "2024-08-05T20:51:32.399Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-15688
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://github.com/embedthis/goahead-gpl/issues/3 | x_refsource_MISC | |
https://github.com/embedthis/goahead-gpl/issues/3 | x_refsource_CONFIRM | |
http://packetstormsecurity.com/files/159505/EmbedThis-GoAhead-Web-Server-5.1.1-Digest-Authentication-Capture-Replay-Nonce-Reuse.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:22:30.807Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/embedthis/goahead-gpl/issues/3" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/embedthis/goahead-gpl/issues/3" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/159505/EmbedThis-GoAhead-Web-Server-5.1.1-Digest-Authentication-Capture-Replay-Nonce-Reuse.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-07-15T00:00:00", "descriptions": [ { "lang": "en", "value": "The HTTP Digest Authentication in the GoAhead web server before 5.1.2 does not completely protect against replay attacks. This allows an unauthenticated remote attacker to bypass authentication via capture-replay if TLS is not used to protect the underlying communication channel." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-07T17:06:16", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/embedthis/goahead-gpl/issues/3" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/embedthis/goahead-gpl/issues/3" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/159505/EmbedThis-GoAhead-Web-Server-5.1.1-Digest-Authentication-Capture-Replay-Nonce-Reuse.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-15688", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The HTTP Digest Authentication in the GoAhead web server before 5.1.2 does not completely protect against replay attacks. This allows an unauthenticated remote attacker to bypass authentication via capture-replay if TLS is not used to protect the underlying communication channel." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/embedthis/goahead-gpl/issues/3", "refsource": "MISC", "url": "https://github.com/embedthis/goahead-gpl/issues/3" }, { "name": "https://github.com/embedthis/goahead-gpl/issues/3", "refsource": "CONFIRM", "url": "https://github.com/embedthis/goahead-gpl/issues/3" }, { "name": "http://packetstormsecurity.com/files/159505/EmbedThis-GoAhead-Web-Server-5.1.1-Digest-Authentication-Capture-Replay-Nonce-Reuse.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/159505/EmbedThis-GoAhead-Web-Server-5.1.1-Digest-Authentication-Capture-Replay-Nonce-Reuse.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-15688", "datePublished": "2020-07-23T12:32:37", "dateReserved": "2020-07-13T00:00:00", "dateUpdated": "2024-08-04T13:22:30.807Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-5097
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0889 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:47:56.843Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0889" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EmbedThis", "vendor": "n/a", "versions": [ { "status": "affected", "version": "EmbedThis GoAhead Web Server v5.0.1 EmbedThis GoAhead Web Server v4.1.1 EmbedThis GoAhead Web Server v3.6.5" } ] } ], "descriptions": [ { "lang": "en", "value": "A denial-of-service vulnerability exists in the processing of multi-part/form-data requests in the base GoAhead web server application in versions v5.0.1, v.4.1.1 and v3.6.5. A specially crafted HTTP request can lead to an infinite loop in the process. The request can be unauthenticated in the form of GET or POST requests and does not require the requested resource to exist on the server." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-835", "description": "CWE-835: Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-19T17:34:09", "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "shortName": "talos" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0889" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "talos-cna@cisco.com", "ID": "CVE-2019-5097", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EmbedThis", "version": { "version_data": [ { "version_value": "EmbedThis GoAhead Web Server v5.0.1 EmbedThis GoAhead Web Server v4.1.1 EmbedThis GoAhead Web Server v3.6.5" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A denial-of-service vulnerability exists in the processing of multi-part/form-data requests in the base GoAhead web server application in versions v5.0.1, v.4.1.1 and v3.6.5. A specially crafted HTTP request can lead to an infinite loop in the process. The request can be unauthenticated in the form of GET or POST requests and does not require the requested resource to exist on the server." } ] }, "impact": { "cvss": { "baseScore": 5.3, "baseSeverity": "Medium", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-835: Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0889", "refsource": "MISC", "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0889" } ] } } } }, "cveMetadata": { "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "assignerShortName": "talos", "cveId": "CVE-2019-5097", "datePublished": "2019-12-03T21:49:38", "dateReserved": "2019-01-04T00:00:00", "dateUpdated": "2024-08-04T19:47:56.843Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-3186
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-3186", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-17T14:41:17.067450Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-17T14:41:27.052Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "GoAhead", "repo": "https://www.embedthis.com/goahead/download.html", "vendor": "EmbedThis", "versions": [ { "lessThanOrEqual": "6.0.0", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Diego Zaffaroni of Nozomi Networks found this bug during a security research activity." } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "CWE-476 NULL Pointer Dereference vulnerability in the evalExpr() function of GoAhead Web Server (version \u0026lt;= 6.0.0) when compiled with the ME_GOAHEAD_JAVASCRIPT flag. This vulnerability allows a remote attacker with the privileges to modify JavaScript template (JST) files to trigger a crash and cause a Denial of Service (DoS) by providing malicious templates." } ], "value": "CWE-476 NULL Pointer Dereference vulnerability in the evalExpr() function of GoAhead Web Server (version \u003c= 6.0.0) when compiled with the ME_GOAHEAD_JAVASCRIPT flag. This vulnerability allows a remote attacker with the privileges to modify JavaScript template (JST) files to trigger a crash and cause a Denial of Service (DoS) by providing malicious templates." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-17T07:34:37.433Z", "orgId": "bec8025f-a851-46e5-b3a3-058e6b0aa23c", "shortName": "Nozomi" }, "references": [ { "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-3186" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "It is recommended to apply fixes introduced in version 6.0.1 of GoAhead and use the latest version available as base for building custom web servers." } ], "value": "It is recommended to apply fixes introduced in version 6.0.1 of GoAhead and use the latest version available as base for building custom web servers." } ], "source": { "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "bec8025f-a851-46e5-b3a3-058e6b0aa23c", "assignerShortName": "Nozomi", "cveId": "CVE-2024-3186", "datePublished": "2024-10-17T07:34:37.433Z", "dateReserved": "2024-04-02T13:02:29.658Z", "dateUpdated": "2024-10-17T14:41:27.052Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-19240
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://github.com/embedthis/goahead/issues/290 | x_refsource_MISC | |
https://github.com/embedthis/goahead/issues/289 | x_refsource_MISC | |
https://github.com/embedthis/goahead/releases/tag/v5.0.1 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T02:09:39.553Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/embedthis/goahead/issues/290" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/embedthis/goahead/issues/289" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/embedthis/goahead/releases/tag/v5.0.1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Embedthis GoAhead before 5.0.1 mishandles redirected HTTP requests with a large Host header. The GoAhead WebsRedirect uses a static host buffer that has a limited length and can overflow. This can cause a copy of the Host header to fail, leaving that buffer uninitialized, which may leak uninitialized data in a response." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-22T18:46:04", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/embedthis/goahead/issues/290" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/embedthis/goahead/issues/289" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/embedthis/goahead/releases/tag/v5.0.1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-19240", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Embedthis GoAhead before 5.0.1 mishandles redirected HTTP requests with a large Host header. The GoAhead WebsRedirect uses a static host buffer that has a limited length and can overflow. This can cause a copy of the Host header to fail, leaving that buffer uninitialized, which may leak uninitialized data in a response." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/embedthis/goahead/issues/290", "refsource": "MISC", "url": "https://github.com/embedthis/goahead/issues/290" }, { "name": "https://github.com/embedthis/goahead/issues/289", "refsource": "MISC", "url": "https://github.com/embedthis/goahead/issues/289" }, { "name": "https://github.com/embedthis/goahead/releases/tag/v5.0.1", "refsource": "MISC", "url": "https://github.com/embedthis/goahead/releases/tag/v5.0.1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-19240", "datePublished": "2019-11-22T18:46:04", "dateReserved": "2019-11-22T00:00:00", "dateUpdated": "2024-08-05T02:09:39.553Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }