{"vulnerability": "CVE-2021-42342", "sightings": [{"uuid": "2997088a-3c6a-4110-8841-39ede4c5e703", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42342", "type": "seen", "source": "https://t.me/arpsyndicate/3161", "content": "#ExploitObserverAlert\n\nCVE-2021-42342\n\nDESCRIPTION: Exploit Observer has 10 entries in 3 file formats related to CVE-2021-42342. An issue was discovered in GoAhead 4.x and 5.x before 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerable CGI scripts.\n\nFIRST-EPSS: 0.040180000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2024-01-28T02:13:35.000000Z"}, {"uuid": "afb55f19-03ef-4227-81d5-4b59ccf8b35a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42342", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1265", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aCVE-2021-42342 RCE\nURL\uff1ahttps://github.com/Mr-xn/CVE-2021-42342", "creation_timestamp": "2022-01-04T14:58:20.000000Z"}, {"uuid": "ba64130f-dcd4-49d8-bfb4-182f428f3a47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42342", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/4552", "content": "#exploit\n1. CVE-2021-42342:\nGoahead webserver (&lt;5.1.5) RCE\nhttps://github.com/kimusan/goahead-webserver-pre-5.1.5-RCE-PoC-CVE-2021-42342-\n\n2. Windows Exploitation Tricks: Relaying DCOM Authentication\nhttps://googleprojectzero.blogspot.com/2021/10/windows-exploitation-tricks-relaying.html", "creation_timestamp": "2022-07-06T21:49:42.000000Z"}, {"uuid": "fe534651-95a6-4c61-9466-0d5232b778c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42342", "type": "seen", "source": "https://t.me/cibsecurity/30550", "content": "\u203c CVE-2021-42342 \u203c\n\nAn issue was discovered in GoAhead 4.x and 5.x before 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerable CGI scripts.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-14T12:34:05.000000Z"}, {"uuid": "2f877298-7046-4428-9b41-c3d266b5c3da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42342", "type": "published-proof-of-concept", "source": "https://t.me/hacker_trick/592", "content": "CVE-2021-45232-RCE-Multi-threaded\nbatch vulnerability detection\nhttps://github.com/GYLQ/CVE-2021-45232-RCE\n\npoc and patches for\nCVE-2021-45383 &amp; CVE-2021-45384\nhttps://github.com/nt1dr/CVE-2021-45383\n\nCVE-2021-42342 RCE\nhttps://github.com/Mr-xn/CVE-2021-42342", "creation_timestamp": "2022-01-05T20:44:34.000000Z"}, {"uuid": "3d859307-c96b-45bc-806c-e1c1ff6b5efc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-42342", "type": "published-proof-of-concept", "source": "https://t.me/hacker_trick/307", "content": "A small #poc for the recent RCE found in the Goahead Webserver prior to version 5.1.5\n\nhttps://github.com/kimusan/goahead-webserver-pre-5.1.5-RCE-PoC-CVE-2021-42342-", "creation_timestamp": "2021-10-19T10:23:59.000000Z"}]}