EmbedThis GoAhead 3.0.0 through 3.4.1 does not properly handle path segments starting with a . (dot), which allows remote attackers to conduct directory traversal attacks, cause a denial of service (heap-based buffer overflow and crash), or possibly execute arbitrary code via a crafted URI.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:21
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/131156/GoAhead-3.4.1-Heap-Overflow-Traversal.html - Exploit | |
References | () http://seclists.org/fulldisclosure/2015/Mar/157 - Exploit | |
References | () http://www.securityfocus.com/archive/1/535027/100/0/threaded - | |
References | () http://www.securitytracker.com/id/1032208 - | |
References | () https://github.com/embedthis/goahead/commit/eed4a7d177bf94a54c7b06ccce88507fbd76fb77 - | |
References | () https://github.com/embedthis/goahead/issues/106 - |
Information
Published : 2015-03-31 14:59
Updated : 2024-11-21 02:21
NVD link : CVE-2014-9707
Mitre link : CVE-2014-9707
CVE.ORG link : CVE-2014-9707
JSON object : View
Products Affected
embedthis
- goahead
CWE
CWE-17
DEPRECATED: Code