Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xrrx-hrm6-mxr7

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

An issue was discovered in GoAhead 4.x and 5.x before 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerable CGI scripts.

An issue was discovered in GoAhead 4.x and 5.x before 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerable CGI scripts.

EPSS

Процентиль: 99%
0.77601
Высокий

Дефекты

CWE-434

Связанные уязвимости

CVSS3: 9.8
nvd
больше 4 лет назад

An issue was discovered in GoAhead 4.x and 5.x before 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerable CGI scripts.

EPSS

Процентиль: 99%
0.77601
Высокий

Дефекты

CWE-434