Description
An issue was discovered in GoAhead 4.x and 5.x before 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerable CGI scripts.
Published: 2021-10-14
Score: 9.8 Critical
EPSS: 77.6% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

No history.

Subscriptions

Embedthis Goahead
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T03:30:38.334Z

Reserved: 2021-10-14T00:00:00.000Z

Link: CVE-2021-42342

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-10-14T06:15:07.037

Modified: 2024-11-21T06:27:38.790

Link: CVE-2021-42342

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses