First published: Mon Aug 08 2022(Updated: )
websda.c in GoAhead WebServer 2.1.8 has insufficient nonce entropy because the nonce calculation relies on the hardcoded onceuponatimeinparadise value, which does not follow the secret-data guideline for HTTP Digest Access Authentication in RFC 7616 section 3.3 (or RFC 2617 section 3.2.1). NOTE: 2.1.8 is a version from 2003; however, the affected websda.c code appears in multiple derivative works that may be used in 2021. Recent GoAhead software is unaffected.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Embedthis GoAhead | =2.1.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-41615.
The severity of CVE-2021-41615 is critical with a score of 9.8.
The affected software is GoAhead WebServer version 2.1.8.
The CWE ID for this vulnerability is CWE-331.
To fix this vulnerability, update to a version of GoAhead WebServer that is not affected by this issue.