An issue was discovered in GoAhead 4.x and 5.x before 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerable CGI scripts.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/embedthis/goahead/issues/305 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T03:30:38.334Z
Reserved: 2021-10-14T00:00:00
Link: CVE-2021-42342

No data.

Status : Modified
Published: 2021-10-14T06:15:07.037
Modified: 2024-11-21T06:27:38.790
Link: CVE-2021-42342

No data.