Goahead Versions <= 6.0.0 Vulnerable to Use After Free and Double Free Vulnerabilities
CVE-2024-3187

5.9MEDIUM

Key Information:

Vendor
Embedthis
Status
Goahead
Vendor
CVE Published:
17 October 2024

Summary

This vulnerability involves two specific issues classified as Use After Free (UAF) and one Double Free vulnerability within the Goahead web server framework. These vulnerabilities stem from Javascript template (JST) values not being cleared when they are freed during the parsing of JST templates. If the ME_GOAHEAD_JAVASCRIPT flag is activated, an attacker with the ability to modify JST files could exploit this flaw by uploading malicious templates. This can lead to memory corruption, resulting in potential Denial of Service conditions, with the possibility of code execution under particular circumstances.

Affected Version(s)

GoAhead 0 <= 6.0.0

References

CVSS V3.1

Score:
5.9
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database

Credit

Diego Zaffaroni of Nozomi Networks found this bug during a security research activity.
.