Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xrwv-jchf-q5j2

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Embedthis GoAhead before 5.0.1 mishandles redirected HTTP requests with a large Host header. The GoAhead WebsRedirect uses a static host buffer that has a limited length and can overflow. This can cause a copy of the Host header to fail, leaving that buffer uninitialized, which may leak uninitialized data in a response.

Embedthis GoAhead before 5.0.1 mishandles redirected HTTP requests with a large Host header. The GoAhead WebsRedirect uses a static host buffer that has a limited length and can overflow. This can cause a copy of the Host header to fail, leaving that buffer uninitialized, which may leak uninitialized data in a response.

EPSS

Процентиль: 67%
0.00533
Низкий

Связанные уязвимости

CVSS3: 5.3
nvd
около 6 лет назад

Embedthis GoAhead before 5.0.1 mishandles redirected HTTP requests with a large Host header. The GoAhead WebsRedirect uses a static host buffer that has a limited length and can overflow. This can cause a copy of the Host header to fail, leaving that buffer uninitialized, which may leak uninitialized data in a response.

EPSS

Процентиль: 67%
0.00533
Низкий