Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2019-16645Code Injection in Goahead

CWE-94Code Injection4 documents4 sources
Severity
8.6HIGHNVD
EPSS
16.7%
top 5.06%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedSep 20
Latest updateMay 24

Description

An issue was discovered in Embedthis GoAhead 2.5.0. Certain pages (such as goform/login and config/log_off_page.htm) create links containing a hostname obtained from an arbitrary HTTP Host header sent by an attacker. This could potentially be used in a phishing attack.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:NExploitability: 3.9 | Impact: 4.0

Affected Packages1 packages

🔴Vulnerability Details

2
GHSA
GHSA-fwcq-vxfg-777g: An issue was discovered in Embedthis GoAhead 22022-05-24
CVEList
CVE-2019-16645: An issue was discovered in Embedthis GoAhead 22019-09-20

💥Exploits & PoCs

1
Exploit-DB
GoAhead 2.5.0 - Host Header Injection2019-09-30
CVE-2019-16645 — Code Injection in Embedthis Goahead | cvebase