Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2017-17562

Опубликовано: 12 дек. 2017
Источник: nvd
CVSS3: 8.1
CVSS2: 6.8
EPSS Критический

Описание

Embedthis GoAhead before 3.6.5 allows remote code execution if CGI is enabled and a CGI program is dynamically linked. This is a result of initializing the environment of forked CGI scripts using untrusted HTTP request parameters in the cgiHandler function in cgi.c. When combined with the glibc dynamic linker, this behaviour can be abused for remote code execution using special parameter names such as LD_PRELOAD. An attacker can POST their shared object payload in the body of the request, and reference it using /proc/self/fd/0.

Ссылки

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:embedthis:goahead:*:*:*:*:*:*:*:*
Версия до 3.6.5 (исключая)
Конфигурация 2

Одно из

cpe:2.3:a:oracle:integrated_lights_out_manager:3.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:integrated_lights_out_manager:4.0:*:*:*:*:*:*:*

EPSS

Процентиль: 100%
0.94134
Критический

8.1 High

CVSS3

6.8 Medium

CVSS2

Дефекты

NVD-CWE-noinfo

Связанные уязвимости

CVSS3: 8.1
github
больше 3 лет назад

Embedthis GoAhead before 3.6.5 allows remote code execution if CGI is enabled and a CGI program is dynamically linked. This is a result of initializing the environment of forked CGI scripts using untrusted HTTP request parameters in the cgiHandler function in cgi.c. When combined with the glibc dynamic linker, this behaviour can be abused for remote code execution using special parameter names such as LD_PRELOAD. An attacker can POST their shared object payload in the body of the request, and reference it using /proc/self/fd/0.

fstec
больше 8 лет назад

Уязвимость функции cgiHandler веб-сервера Embedthis GoAhead, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 100%
0.94134
Критический

8.1 High

CVSS3

6.8 Medium

CVSS2

Дефекты

NVD-CWE-noinfo