Vulnerability Details : CVE-2014-9707
Public exploit exists!
EmbedThis GoAhead 3.0.0 through 3.4.1 does not properly handle path segments starting with a . (dot), which allows remote attackers to conduct directory traversal attacks, cause a denial of service (heap-based buffer overflow and crash), or possibly execute arbitrary code via a crafted URI.
Vulnerability category: OverflowDirectory traversalExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2014-9707
Probability of exploitation activity in the next 30 days: 9.89%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 94 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2014-9707
-
Embedthis GoAhead Embedded Web Server Directory Traversal
First seen: 2020-04-26auxiliary/scanner/http/goahead_traversalThis module exploits a directory traversal vulnerability in the Embedthis GoAhead Web Server v3.4.1, allowing an attacker to read arbitrary files with the web server privileges. Authors: - Matthew Daley - Roberto Soares Espreto <robertoespreto@gmail.com>
CVSS scores for CVE-2014-9707
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2014-9707
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-9707
-
http://www.securitytracker.com/id/1032208
GoAhead Web Server Heap Overflow in websNormalizeUriPath() Lets Remote Users Execute Arbitrary Code - SecurityTracker
-
https://github.com/embedthis/goahead/issues/106
URI Parsing Dot Segments · Issue #106 · embedthis/goahead · GitHub
-
http://www.securityfocus.com/archive/1/535027/100/0/threaded
SecurityFocus
-
http://packetstormsecurity.com/files/131156/GoAhead-3.4.1-Heap-Overflow-Traversal.html
GoAhead 3.4.1 Heap Overflow / Traversal ≈ Packet StormExploit
-
http://seclists.org/fulldisclosure/2015/Mar/157
Full Disclosure: Advisory: CVE-2014-9707: GoAhead Web Server 3.0.0 - 3.4.1Exploit
-
https://github.com/embedthis/goahead/commit/eed4a7d177bf94a54c7b06ccce88507fbd76fb77
FIX: Dot filename segments permit directory traversal [issue 106] · embedthis/goahead@eed4a7d · GitHub
Products affected by CVE-2014-9707
- cpe:2.3:a:embedthis:goahead:3.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:embedthis:goahead:3.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:embedthis:goahead:3.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:embedthis:goahead:3.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:embedthis:goahead:3.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:embedthis:goahead:3.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:embedthis:goahead:3.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:embedthis:goahead:3.3.3:*:*:*:*:*:*:*