Vulnerabilities > CVE-2014-9707 - Code vulnerability in Embedthis Goahead
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
EmbedThis GoAhead 3.0.0 through 3.4.1 does not properly handle path segments starting with a . (dot), which allows remote attackers to conduct directory traversal attacks, cause a denial of service (heap-based buffer overflow and crash), or possibly execute arbitrary code via a crafted URI.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 8 |
Common Weakness Enumeration (CWE)
Metasploit
description | This module exploits a directory traversal vulnerability in the Embedthis GoAhead Web Server v3.4.1, allowing an attacker to read arbitrary files with the web server privileges. |
id | MSF:AUXILIARY/SCANNER/HTTP/GOAHEAD_TRAVERSAL |
last seen | 2019-11-24 |
modified | 2019-03-05 |
published | 2015-04-07 |
references | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9707 |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/auxiliary/scanner/http/goahead_traversal.rb |
title | Embedthis GoAhead Embedded Web Server Directory Traversal |
Nessus
NASL family | Web Servers |
NASL id | GOAHEAD_CVE_2014_9707.NASL |
description | The remote GoAhead embedded web server is affected by a directory traversal vulnerability due to a flaw in the websNormalizeUriPath() function. A remote, unauthenticated attacker can exploit this flaw to obtain arbitrary files on the affected host. The flaw that allows the directory traversal may also be used to perform a heap-based buffer overflow, potentially allowing code execution or a denial of service condition. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 82566 |
published | 2015-04-03 |
reporter | This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/82566 |
title | GoAhead Embedded Web Server websNormalizeUriPath() Directory Traversal Vulnerability |
code |
|
Packetstorm
data source | https://packetstormsecurity.com/files/download/131156/goahead341-overflowtraversal.txt |
id | PACKETSTORM:131156 |
last seen | 2016-12-05 |
published | 2015-03-28 |
reporter | Matthew Daley |
source | https://packetstormsecurity.com/files/131156/GoAhead-3.4.1-Heap-Overflow-Traversal.html |
title | GoAhead 3.4.1 Heap Overflow / Traversal |
References
- http://seclists.org/fulldisclosure/2015/Mar/157
- https://github.com/embedthis/goahead/issues/106
- https://github.com/embedthis/goahead/commit/eed4a7d177bf94a54c7b06ccce88507fbd76fb77
- http://packetstormsecurity.com/files/131156/GoAhead-3.4.1-Heap-Overflow-Traversal.html
- http://www.securitytracker.com/id/1032208
- http://www.securityfocus.com/archive/1/535027/100/0/threaded