Embedthis GoAhead 4.1.1

CPE Details

Embedthis GoAhead 4.1.1
4.1.1
2019-06-17
10h24 +00:00
2019-06-17
10h24 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:embedthis:goahead:4.1.1:*:*:*:*:*:*:*

Informations

Vendor

embedthis

Product

goahead

Version

4.1.1

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2021-43298 2022-01-25 18h11 +00:00 The code that performs password matching when using 'Basic' HTTP authentication does not use a constant-time memcmp and has no rate-limiting. This means that an unauthenticated network attacker can brute-force the HTTP basic password, byte-by-byte, by recording the webserver's response time until the unauthorized (401) response.
9.8
Critical
CVE-2021-42342 2021-10-14 03h08 +00:00 An issue was discovered in GoAhead 4.x and 5.x before 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerable CGI scripts.
9.8
Critical
CVE-2020-15688 2020-07-23 10h32 +00:00 The HTTP Digest Authentication in the GoAhead web server before 5.1.2 does not completely protect against replay attacks. This allows an unauthenticated remote attacker to bypass authentication via capture-replay if TLS is not used to protect the underlying communication channel.
8.8
High
CVE-2019-5096 2019-12-03 20h52 +00:00 An exploitable code execution vulnerability exists in the processing of multi-part/form-data requests within the base GoAhead web server application in versions v5.0.1, v.4.1.1 and v3.6.5. A specially crafted HTTP request can lead to a use-after-free condition during the processing of this request that can be used to corrupt heap structures that could lead to full code execution. The request can be unauthenticated in the form of GET or POST requests, and does not require the requested resource to exist on the server.
9.8
Critical
CVE-2019-5097 2019-12-03 20h49 +00:00 A denial-of-service vulnerability exists in the processing of multi-part/form-data requests in the base GoAhead web server application in versions v5.0.1, v.4.1.1 and v3.6.5. A specially crafted HTTP request can lead to an infinite loop in the process. The request can be unauthenticated in the form of GET or POST requests and does not require the requested resource to exist on the server.
7.5
High
CVE-2019-19240 2019-11-22 17h46 +00:00 Embedthis GoAhead before 5.0.1 mishandles redirected HTTP requests with a large Host header. The GoAhead WebsRedirect uses a static host buffer that has a limited length and can overflow. This can cause a copy of the Host header to fail, leaving that buffer uninitialized, which may leak uninitialized data in a response.
5.3
Medium