Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

GoAhead Server HTTP Header Injection Vulnerability

Information

Severity

Severity

Medium

Family

Family

Web Servers

CVSSv2 Base

CVSSv2 Base

5.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:P/A:N

Solution Type

Solution Type

None Solution Available

Created

Created

4 years ago

Modified

Modified

4 years ago

Summary

Embedthis GoAhead is prone to an HTTP header injection vulnerability.

Insight

Insight

For certain pages, Embedthis GoAhead creates links containing a hostname obtained from an arbitrary HTTP Host header sent by an attacker.

Affected Software

Affected Software

At least GoAhead version 2.5.0.

Detection Method

Detection Method

Checks if such a manipulated link can be created.

Solution

Solution

No known solution is available as of 27th September, 2019. Information regarding this issue will be updated once solution details are available.

Common Vulnerabilities and Exposures (CVE)