First published: Tue Dec 12 2017(Updated: )
Embedthis GoAhead before 3.6.5 allows remote code execution if CGI is enabled and a CGI program is dynamically linked. This is a result of initializing the environment of forked CGI scripts using untrusted HTTP request parameters in the cgiHandler function in cgi.c. When combined with the glibc dynamic linker, this behaviour can be abused for remote code execution using special parameter names such as LD_PRELOAD. An attacker can POST their shared object payload in the body of the request, and reference it using /proc/self/fd/0.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Embedthis GoAhead | <3.6.5 | |
Embedthis GoAhead | ||
Oracle Integrated Lights Out Manager | =3.0 | |
Oracle Integrated Lights Out Manager | =4.0 | |
General Electric Renewable Energy iNET/iNET II series radio firmware versions prior to rev. 8.3.0 | ||
General Electric Renewable Energy SD series radio firmware versions prior to rev. 6.4.7 | ||
General Electric Renewable Energy TD220X series radio firmware versions prior to rev. 2.0.16 | ||
General Electric Renewable Energy TD220MAX series radio firmware versions prior to rev. 1.2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-17562 is a vulnerability in Embedthis GoAhead before version 3.6.5 that allows remote code execution if CGI is enabled and a CGI program is dynamically linked.
CVE-2017-17562 has a severity rating of 8.1 (high).
CVE-2017-17562 works by initializing the environment of forked CGI scripts using untrusted HTTP request parameters, allowing for remote code execution.
Embedthis GoAhead before version 3.6.5 is affected by CVE-2017-17562.
To fix CVE-2017-17562, update Embedthis GoAhead to version 3.6.5 or later.