Goahead Versions <= 6.0.0 Vulnerable to Use After Free and Double Free Vulnerabilities
CVE-2024-3187
5.9MEDIUM
Key Information:
- Vendor
- Embedthis
- Status
- Goahead
- Vendor
- CVE Published:
- 17 October 2024
Summary
This vulnerability involves two specific issues classified as Use After Free (UAF) and one Double Free vulnerability within the Goahead web server framework. These vulnerabilities stem from Javascript template (JST) values not being cleared when they are freed during the parsing of JST templates. If the ME_GOAHEAD_JAVASCRIPT flag is activated, an attacker with the ability to modify JST files could exploit this flaw by uploading malicious templates. This can lead to memory corruption, resulting in potential Denial of Service conditions, with the possibility of code execution under particular circumstances.
Affected Version(s)
GoAhead 0 <= 6.0.0
References
CVSS V3.1
Score:
5.9
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database
Credit
Diego Zaffaroni of Nozomi Networks found this bug during a security research activity.