The HTTP Digest Authentication in the GoAhead web server before 5.1.2 does not completely protect against replay attacks. This allows an unauthenticated remote attacker to bypass authentication via capture-replay if TLS is not used to protect the underlying communication channel.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/159505/EmbedThis-GoAhead-Web-Server-5.1.1-Digest-Authentication-Capture-Replay-Nonce-Reuse.html | Exploit Third Party Advisory VDB Entry |
https://github.com/embedthis/goahead-gpl/issues/3 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2020-07-23 13:15
Updated : 2024-02-28 17:47
NVD link : CVE-2020-15688
Mitre link : CVE-2020-15688
CVE.ORG link : CVE-2020-15688
JSON object : View
Products Affected
embedthis
- goahead
CWE
CWE-294
Authentication Bypass by Capture-replay