⚠ Actively exploited
Added to CISA KEV on 2021-12-10. Federal agencies required to patch by 2022-06-10. Required action: Apply updates per vendor instructions..

CVE-2017-17562Improper Input Validation in Goahead

Severity
8.1HIGHNVD
EPSS
94.3%
top 0.05%
CISA KEV
KEV
Added 2021-12-10
Due 2022-06-10
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedDec 12
KEV addedDec 10
Latest updateMay 14
KEV dueJun 10
CISA Required Action: Apply updates per vendor instructions.

Description

Embedthis GoAhead before 3.6.5 allows remote code execution if CGI is enabled and a CGI program is dynamically linked. This is a result of initializing the environment of forked CGI scripts using untrusted HTTP request parameters in the cgiHandler function in cgi.c. When combined with the glibc dynamic linker, this behaviour can be abused for remote code execution using special parameter names such as LD_PRELOAD. An attacker can POST their shared object payload in the body of the request, and re

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9

Affected Packages2 packages

Patches

🔴Vulnerability Details

3
GHSA
GHSA-q5wm-274q-f3v6: Embedthis GoAhead before 32022-05-14
CVEList
CVE-2017-17562: Embedthis GoAhead before 32017-12-12
VulnCheck
Embedthis GoAhead Remote Code Execution Vulnerability2017

💥Exploits & PoCs

3
Exploit-DB
GoAhead Web Server 2.5 < 3.6.5 - HTTPd 'LD_PRELOAD' Arbitrary Module Load (Metasploit)2018-01-24
Exploit-DB
GoAhead Web Server 2.5 < 3.6.5 - HTTPd 'LD_PRELOAD' Remote Code Execution2017-12-18
Nuclei
Embedthis GoAhead <3.6.5 - Remote Code Execution

📋Vendor Advisories

1
CISA
Embedthis GoAhead Remote Code Execution Vulnerability2021-12-10

🕵️Threat Intelligence

1
Huntress
GoAhead Vulnerability CVE-2017-17562: Analysis, Impact, Mitigation | Huntress
CVE-2017-17562 — Improper Input Validation in Goahead | cvebase