Embedthis GoAhead "websNormalizeUriPath()" Directory Traversal Sequences Handling Vulnerability


Description   A vulnerability has been reported in Embedthis GoAhead, which can be exploited by malicious people to disclose potentially sensitive information, cause a DoS (Denial of Service), or potentially compromise a vulnerable system.
The vulnerability is caused due to an error in the "websNormalizeUriPath()" function (src/http.c), which can be exploited to disclose contents of arbitrary local files via directory traversal sequences or cause a heap-based buffer overflow.
The vulnerability is reported in versions prior to 3.4.2.
     
Vulnerable Products   Vulnerable Software:
Embedthis GoAhead 3.x
     
Solution   Update to version 3.4.2.
     
CVE   CVE-2014-9707
     
References   Embedthis GoAhead:
https://github.com/embedthis/goahead/issues/106
Matthew Daley:
http://www.openwall.com/lists/oss-security/2015/03/28/1
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
Misc : Directory traversal - parameter starting with ../
3.2.0
Directory traversal using ..\..
3.2.0
Directory traversal
3.2.0
Directory traversal backward root folder
3.2.0
     


 
 
 
 
 Risk level 
High 

 Vulnerability First Public Report Date 
2015-03-30 

 Target Type 
Server 

 Possible exploit 
Remote