An issue was discovered in GoAhead 4.x and 5.x before 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerable CGI scripts.
References
Link | Resource |
---|---|
https://github.com/embedthis/goahead/issues/305 | Third Party Advisory |
https://github.com/embedthis/goahead/issues/305 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/embedthis/goahead/issues/305 - Third Party Advisory |
Information
Published : 2021-10-14 06:15
Updated : 2024-11-21 06:27
NVD link : CVE-2021-42342
Mitre link : CVE-2021-42342
CVE.ORG link : CVE-2021-42342
JSON object : View
Products Affected
embedthis
- goahead
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type