Embedthis GoAhead before 5.0.1 mishandles redirected HTTP requests with a large Host header. The GoAhead WebsRedirect uses a static host buffer that has a limited length and can overflow. This can cause a copy of the Host header to fail, leaving that buffer uninitialized, which may leak uninitialized data in a response.
References
Link | Resource |
---|---|
https://github.com/embedthis/goahead/issues/290 | Third Party Advisory |
https://github.com/embedthis/goahead/releases/tag/v5.0.1 | Release Notes |
https://github.com/embedthis/goahead/issues/289 | Exploit Third Party Advisory |
Configurations
Information
Published : 2019-11-22 11:15
Updated : 2020-08-24 10:37
NVD link : CVE-2019-19240
Mitre link : CVE-2019-19240
JSON object : View
Products Affected
embedthis
- goahead