TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2017-17562

HIGHCISA KEV
8.1

Beschreibung

Embedthis GoAhead before 3.6.5 allows remote code execution if CGI is enabled and a CGI program is dynamically linked. This is a result of initializing the environment of forked CGI scripts using untrusted HTTP request parameters in the cgiHandler function in cgi.c. When combined with the glibc dynamic linker, this behaviour can be abused for remote code execution using special parameter names such as LD_PRELOAD. An attacker can POST their shared object payload in the body of the request, and reference it using /proc/self/fd/0.

CVE Details

CVSS v3.1 Bewertung8.1
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatHIGH
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht12/12/2017
Zuletzt geandert4/21/2026
Quellekev
Honeypot-Sichtungen0

CISA KEV

HerstellerEmbedthis
ProduktGoAhead
SchwachstellennameEmbedthis GoAhead Remote Code Execution Vulnerability
KEV Aufnahmedatum2021-12-10
Behebungsfrist2022-06-10
Ransomware-NutzungUnknown

Betroffene Produkte

embedthis:goaheadoracle:integrated_lights_out_manager

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.