Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

HTTP:CTS:EMBEDTHIS-GO-FILE-UPL

Severity

Major

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

EmbedThis GoAhead Web Server File Upload Use After Free

Release Date

2020/01/16

Update Number

3244

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

HTTP: EmbedThis GoAhead Web Server File Upload Use After Free


This signature detects attempts to exploit a known vulnerability against EmbedThis GoAhead Web Server. A successful attack can lead to arbitrary code execution.

Extended Description

An exploitable code execution vulnerability exists in the processing of multi-part/form-data requests within the base GoAhead web server application in versions v5.0.1, v.4.1.1 and v3.6.5. A specially crafted HTTP request can lead to a use-after-free condition during the processing of this request that can be used to corrupt heap structures that could lead to full code execution. The request can be unauthenticated in the form of GET or POST requests, and does not require the requested resource to exist on the server.

Affected Products

  • Embedthis goahead 3.6.5
  • Embedthis goahead 4.1.1
  • Embedthis goahead 5.0.1

References

  • CVE: CVE-2019-5096

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out