Vulnerabilities
Vulnerable Software
Embedthis:  >> Goahead  >> 5.1.0  Security Vulnerabilities
The code that performs password matching when using 'Basic' HTTP authentication does not use a constant-time memcmp and has no rate-limiting. This means that an unauthenticated network attacker can brute-force the HTTP basic password, byte-by-byte, by recording the webserver's response time until the unauthorized (401) response.
CVSS Score
9.8
EPSS Score
0.003
Published
2022-01-25
An issue was discovered in GoAhead 4.x and 5.x before 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerable CGI scripts.
CVSS Score
9.8
EPSS Score
0.826
Published
2021-10-14
The HTTP Digest Authentication in the GoAhead web server before 5.1.2 does not completely protect against replay attacks. This allows an unauthenticated remote attacker to bypass authentication via capture-replay if TLS is not used to protect the underlying communication channel.
CVSS Score
8.8
EPSS Score
0.003
Published
2020-07-23


Contact Us

Shodan ® - All rights reserved