9.8
CVSSv3

CVE-2021-42342

Published: 14/10/2021 Updated: 20/10/2021
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 670
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

An issue exists in GoAhead 4.x and 5.x prior to 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerable CGI scripts.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

embedthis goahead

Github Repositories

A small PoC for the recent RCE found in the Goahead Webserver prior to version 5.1.5.

Goahead webserver (pre v515) RCE PoC (CVE-2021-42342) A recent bug in Goahead Webserver was discovered by William Bowling which leads to RCE on the exploited server The issue exists prior to version 515 which, according to Shodan covers around 28mio servers on the internet A CVS is available now [nvdnistgov/vuln/detail/CVE-2021-42342] The RCE is caused by the t

GoAhead Web Server Environment Variables Injection and 'LD_PRELOAD' Remote Code Execution (CVE-2021-42342) GoAhead 4x 및 5x, 즉 515 이전 버전에서 발견된 문제가 있습니다파일 업로드 필터에서 사용자 양식 변수가 CGI 접두사 없이 CGI 스크립트로 전달될 수 있습니다 이는 신뢰할 수 없는 환경 변수를 취약

GoAhead Web Server Environment Variables Injection and 'LD_PRELOAD' Remote Code Execution (CVE-2021-42342) GoAhead 4x 및 5x, 즉 515 이전 버전에서 발견된 문제가 있습니다파일 업로드 필터에서 사용자 양식 변수가 CGI 접두사 없이 CGI 스크립트로 전달될 수 있습니다 이는 신뢰할 수 없는 환경 변수를 취약

CVE-2021-42342 RCE

CVE-2021-42342 CVE-2021-42342 RCE POC1:just prints #include <stdioh> #include <sys/typesh> #include <stdlibh> #include <unistdh> static void before_main(void) __attribute__((constructor)); static void before_main(void) { write(1, "Hello World!\n", 14); } POC2: rever