Embedthis GoAhead before 5.0.1 mishandles redirected HTTP requests with a large Host header. The GoAhead WebsRedirect uses a static host buffer that has a limited length and can overflow. This can cause a copy of the Host header to fail, leaving that buffer uninitialized, which may leak uninitialized data in a response.
References
Link | Resource |
---|---|
https://github.com/embedthis/goahead/issues/289 | Exploit Third Party Advisory |
https://github.com/embedthis/goahead/issues/290 | Third Party Advisory |
https://github.com/embedthis/goahead/releases/tag/v5.0.1 | Release Notes |
Configurations
History
No history.
Information
Published : 2019-11-22 19:15
Updated : 2024-02-28 17:28
NVD link : CVE-2019-19240
Mitre link : CVE-2019-19240
CVE.ORG link : CVE-2019-19240
JSON object : View
Products Affected
embedthis
- goahead