The HTTP Digest Authentication in the GoAhead web server before 5.1.2 does not completely protect against replay attacks. This allows an unauthenticated remote attacker to bypass authentication via capture-replay if TLS is not used to protect the underlying communication channel.
References
Link | Resource |
---|---|
https://github.com/embedthis/goahead-gpl/issues/3 | Third Party Advisory |
http://packetstormsecurity.com/files/159505/EmbedThis-GoAhead-Web-Server-5.1.1-Digest-Authentication-Capture-Replay-Nonce-Reuse.html | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2020-07-23 06:15
Updated : 2023-01-31 09:25
NVD link : CVE-2020-15688
Mitre link : CVE-2020-15688
JSON object : View
CWE
CWE-294
Authentication Bypass by Capture-replay
Products Affected
embedthis
- goahead