First published: Thu Jul 23 2020(Updated: )
The HTTP Digest Authentication in the GoAhead web server before 5.1.2 does not completely protect against replay attacks. This allows an unauthenticated remote attacker to bypass authentication via capture-replay if TLS is not used to protect the underlying communication channel.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Embedthis GoAhead | <5.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2020-15688.
CVE-2020-15688 has a severity rating of 8.8 (high).
The GoAhead web server before version 5.1.2 is affected by CVE-2020-15688.
CVE-2020-15688 allows an unauthenticated remote attacker to bypass authentication via capture-replay if TLS is not used to protect the communication channel.
To fix CVE-2020-15688, it is recommended to upgrade to GoAhead web server version 5.1.2 or later.