CVE-2021-42342

An issue was discovered in GoAhead 4.x and 5.x before 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerable CGI scripts.
References
Link Resource
https://github.com/embedthis/goahead/issues/305 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:embedthis:goahead:*:*:*:*:*:*:*:*
cpe:2.3:a:embedthis:goahead:*:*:*:*:*:*:*:*

History

20 Oct 2021, 17:35

Type Values Removed Values Added
References (MISC) https://github.com/embedthis/goahead/issues/305 - (MISC) https://github.com/embedthis/goahead/issues/305 - Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 9.8
CWE CWE-434
CPE cpe:2.3:a:embedthis:goahead:*:*:*:*:*:*:*:*

14 Oct 2021, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-10-14 06:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-42342

Mitre link : CVE-2021-42342

CVE.ORG link : CVE-2021-42342


JSON object : View

Products Affected

embedthis

  • goahead
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type