First published: Tue Dec 03 2019(Updated: )
An exploitable code execution vulnerability exists in the processing of multi-part/form-data requests within the base GoAhead web server application in versions v5.0.1, v.4.1.1 and v3.6.5. A specially crafted HTTP request can lead to a use-after-free condition during the processing of this request that can be used to corrupt heap structures that could lead to full code execution. The request can be unauthenticated in the form of GET or POST requests, and does not require the requested resource to exist on the server.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Embedthis GoAhead | =3.6.5 | |
Embedthis GoAhead | =4.1.1 | |
Embedthis GoAhead | =5.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-5096 is an exploitable code execution vulnerability in the GoAhead web server application.
The severity of CVE-2019-5096 is critical, with a CVSS score of 9.8.
Versions 3.6.5, 4.1.1, and 5.0.1 of GoAhead are affected by CVE-2019-5096.
CVE-2019-5096 can be exploited through a specially crafted HTTP request that triggers a use-after-free condition.
Yes, a fix for CVE-2019-5096 is available. It is recommended to update to a patched version of GoAhead.