Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
GoAhead Server HTTP Header Injection Vulnerability
Information
Severity
Severity
Medium
Family
Family
Web Servers
CVSSv2 Base
CVSSv2 Base
5.0
CVSSv2 Vector
CVSSv2 Vector
AV:N/AC:L/Au:N/C:N/I:P/A:N
Solution Type
Solution Type
None Solution Available
Created
Created
4 years ago
Modified
Modified
4 years ago
Summary
Embedthis GoAhead is prone to an HTTP header injection vulnerability.
Insight
Insight
For certain pages, Embedthis GoAhead creates links containing a hostname obtained from an arbitrary HTTP Host header sent by an attacker.
Affected Software
Affected Software
At least GoAhead version 2.5.0.
Detection Method
Detection Method
Checks if such a manipulated link can be created.
Solution
Solution
No known solution is available as of 27th September, 2019. Information regarding this issue will be updated once solution details are available.