search menu icon-carat-right cmu-wordmark

CERT Coordination Center


GoAhead WebServer information disclosure and authentication bypass vulnerabilities

Vulnerability Note VU#124059

Original Release Date: 2009-02-05 | Last Revised: 2010-06-22

Overview

GoAhead WebServer contains vulnerabilities that may allow an attacker to view source files containing sensitive information or bypass authentication. The information disclosure vulnerability was previously published as VU#975041.

Description

GoAhead WebServer contains vulnerabilities handling file requests. By sending the web server a specially crafted URL, an attacker may be able to view the source files containing sensitive information or bypass authentication. GoAhead WebServer has a history of source file disclosure vulnerabilities.

Impact

An attacker may be able to view any file on the web server, including files that contain sensitive information like usernames and passwords. An attacker may also be able to bypass authentication for protected files.

Solution

Release notes for GoAhead WebServer 2.1.8 indicate that these vulnerabilities have been addressed. GoAhead WebServer is not being actively maintained. Vendors who redistribute GoAhead WebServer or include it in other products may release updates to address these vulnerabilities. Vendors who have modified GoAhead WebServer may or may not be affected. See the Systems Affected section below for more information.

GoAhead WebServer 2.1.8 on the Microsoft Windows platform remains vulnerable to source file disclosure.


Restrict access

To reduce exposure to these vulnerabilities, restrict network access to vulnerable systems.

Vendor Information

124059
Expand all

GoAhead Software, Inc.

Updated:  June 22, 2010

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Vendor References

http://data.goahead.com/Software/Webserver/2.1.8/release.htm#security-features-can-be-bypassed-by-adding-an-extra-slash-in-the-url-bug01518

Addendum

See http://data.goahead.com/Software/Webserver/2.1.8/release.htm#security-features-can-be-bypassed-by-adding-an-extra-slash-in-the-url-bug01518 for more information..

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Rockwell Automation

Updated:  December 29, 2009

Status

  Vulnerable

Vendor Statement

Please refer to our KnowledgeBase article for more information on this issue. It can be found here:

http://rockwellautomation.custhelp.com/cgi-bin/rockwellautomation.cfg/php/enduser/std_adp.php?p_faqid=57729

This article will be updated as information becomes available.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A

References

Credit

Thanks to Daniel Peck of Digital Bond, Inc. for reporting this issue.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: CVE-2002-1603
Severity Metric: 0.06
Date Public: 2002-12-17
Date First Published: 2009-02-05
Date Last Updated: 2010-06-22 23:42 UTC
Document Revision: 81

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.