First published: Thu Oct 14 2021(Updated: )
An issue was discovered in GoAhead 4.x and 5.x before 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerable CGI scripts.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Embedthis GoAhead | >=4.0.0<=4.1.3 | |
Embedthis GoAhead | >=5.0.0<5.1.5 | |
>=4.0.0<=4.1.3 | ||
>=5.0.0<5.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-42342.
The severity of CVE-2021-42342 is critical, with a severity value of 9.8.
The affected software for CVE-2021-42342 is GoAhead 4.x and 5.x before 5.1.5.
CVE-2021-42342 is an issue in GoAhead where user form variables can be passed to CGI scripts without being prefixed with the CGI prefix, allowing tunneling untrusted environment variables into vulnerable CGI scripts.
To fix CVE-2021-42342, update to GoAhead version 5.1.5 or later.