EmbedThis GoAhead 3.3.2

CPE Details

EmbedThis GoAhead 3.3.2
3.3.2
2015-03-31
16h54 +00:00
2015-04-02
14h50 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:embedthis:goahead:3.3.2:*:*:*:*:*:*:*

Informations

Vendor

embedthis

Product

goahead

Version

3.3.2

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2021-43298 2022-01-25 18h11 +00:00 The code that performs password matching when using 'Basic' HTTP authentication does not use a constant-time memcmp and has no rate-limiting. This means that an unauthenticated network attacker can brute-force the HTTP basic password, byte-by-byte, by recording the webserver's response time until the unauthorized (401) response.
9.8
Critique
CVE-2020-15688 2020-07-23 10h32 +00:00 The HTTP Digest Authentication in the GoAhead web server before 5.1.2 does not completely protect against replay attacks. This allows an unauthenticated remote attacker to bypass authentication via capture-replay if TLS is not used to protect the underlying communication channel.
8.8
Haute
CVE-2019-19240 2019-11-22 17h46 +00:00 Embedthis GoAhead before 5.0.1 mishandles redirected HTTP requests with a large Host header. The GoAhead WebsRedirect uses a static host buffer that has a limited length and can overflow. This can cause a copy of the Host header to fail, leaving that buffer uninitialized, which may leak uninitialized data in a response.
5.3
Moyen
CVE-2019-12822 2019-06-14 11h06 +00:00 In http.c in Embedthis GoAhead before 4.1.1 and 5.x before 5.0.1, a header parsing vulnerability causes a memory assertion, out-of-bounds memory reference, and potential DoS, as demonstrated by a colon on a line by itself.
7.5
Haute
CVE-2018-15504 2018-08-17 22h00 +00:00 An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. The server mishandles some HTTP request fields associated with time, which results in a NULL pointer dereference, as demonstrated by If-Modified-Since or If-Unmodified-Since with a month greater than 11.
7.5
Haute
CVE-2018-15505 2018-08-17 22h00 +00:00 An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. An HTTP POST request with a specially crafted "Host" header field may cause a NULL pointer dereference and thus cause a denial of service, as demonstrated by the lack of a trailing ']' character in an IPv6 address.
7.5
Haute
CVE-2017-17562 2017-12-12 19h00 +00:00 Embedthis GoAhead before 3.6.5 allows remote code execution if CGI is enabled and a CGI program is dynamically linked. This is a result of initializing the environment of forked CGI scripts using untrusted HTTP request parameters in the cgiHandler function in cgi.c. When combined with the glibc dynamic linker, this behaviour can be abused for remote code execution using special parameter names such as LD_PRELOAD. An attacker can POST their shared object payload in the body of the request, and reference it using /proc/self/fd/0.
8.1
Haute
CVE-2014-9707 2015-03-31 12h00 +00:00 EmbedThis GoAhead 3.0.0 through 3.4.1 does not properly handle path segments starting with a . (dot), which allows remote attackers to conduct directory traversal attacks, cause a denial of service (heap-based buffer overflow and crash), or possibly execute arbitrary code via a crafted URI.
7.5