Embedthis GoAhead before 5.0.1 mishandles redirected HTTP requests with a large Host header. The GoAhead WebsRedirect uses a static host buffer that has a limited length and can overflow. This can cause a copy of the Host header to fail, leaving that buffer uninitialized, which may leak uninitialized data in a response.
References
Link | Resource |
---|---|
https://github.com/embedthis/goahead/issues/289 | Exploit Third Party Advisory |
https://github.com/embedthis/goahead/issues/290 | Third Party Advisory |
https://github.com/embedthis/goahead/releases/tag/v5.0.1 | Release Notes |
https://github.com/embedthis/goahead/issues/289 | Exploit Third Party Advisory |
https://github.com/embedthis/goahead/issues/290 | Third Party Advisory |
https://github.com/embedthis/goahead/releases/tag/v5.0.1 | Release Notes |
Configurations
History
21 Nov 2024, 04:34
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/embedthis/goahead/issues/289 - Exploit, Third Party Advisory | |
References | () https://github.com/embedthis/goahead/issues/290 - Third Party Advisory | |
References | () https://github.com/embedthis/goahead/releases/tag/v5.0.1 - Release Notes |
Information
Published : 2019-11-22 19:15
Updated : 2024-11-21 04:34
NVD link : CVE-2019-19240
Mitre link : CVE-2019-19240
CVE.ORG link : CVE-2019-19240
JSON object : View
Products Affected
embedthis
- goahead