Description
An issue was discovered in GoAhead 4.x and 5.x before 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerable CGI scripts.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
| Link | Providers |
|---|---|
| https://github.com/embedthis/goahead/issues/305 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T03:30:38.334Z
Reserved: 2021-10-14T00:00:00.000Z
Link: CVE-2021-42342
No data.
Status : Modified
Published: 2021-10-14T06:15:07.037
Modified: 2024-11-21T06:27:38.790
Link: CVE-2021-42342
No data.
OpenCVE Enrichment
No data.
Weaknesses