First published: Fri Nov 22 2019(Updated: )
Embedthis GoAhead before 5.0.1 mishandles redirected HTTP requests with a large Host header. The GoAhead WebsRedirect uses a static host buffer that has a limited length and can overflow. This can cause a copy of the Host header to fail, leaving that buffer uninitialized, which may leak uninitialized data in a response.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Embedthis GoAhead | <5.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for Embedthis GoAhead before 5.0.1 is CVE-2019-19240.
The severity of CVE-2019-19240 is medium with a severity value of 5.3.
Embedthis GoAhead before 5.0.1 mishandles redirected HTTP requests with a large Host header, causing a buffer overflow.
The vulnerability CVE-2019-19240 can be exploited by sending redirected HTTP requests with a large Host header, which triggers a buffer overflow.
To fix the vulnerability in Embedthis GoAhead, update to version 5.0.1 or higher.