SonicALERT
Search

Sonicwall Signatures

 

Go to All Categories list.


  EmbedThis GoAhead File Upload Filter Remote Code Execution

Category: IoT-ATTACKS      

An issue was discovered in GoAhead 4.x and 5.x before 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerable CGI scripts.

References
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3599


Relevant Information