info: name:Embedthis GoAhead <3.6.5 - Remote Code Execution author:geeknik severity:high description:| description:Embedthis GoAhead before 3.6.5 allows remote code execution if CGI is enabled and a CGI program is dynamically linked. impact:| Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the target system. remediation:| Upgrade to Embedthis GoAhead version 3.6.5 or later to mitigate this vulnerability. reference: -https://www.elttam.com/blog/goahead/ -https://github.com/ivanitlearning/CVE-2017-17562 -https://github.com/vulhub/vulhub/tree/master/goahead/CVE-2017-17562 -https://github.com/embedthis/goahead/issues/249 -https://nvd.nist.gov/vuln/detail/CVE-2017-17562 classification: cvss-metrics:CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score:8.1 cve-id:CVE-2017-17562 cwe-id:CWE-20 epss-score:0.94053 epss-percentile:0.99889 cpe:cpe:2.3:a:embedthis:goahead:*:*:*:*:*:*:*:* metadata: max-request:66 vendor:embedthis product:goahead shodan-query:cpe:"cpe:2.3:a:embedthis:goahead" tags:cve,cve2017,rce,goahead,fuzz,kev,vulhub,embedthis
flow:http(1) && http(2)
http: -raw: -| GET /cgi-bin/ HTTP/1.1 Host:{{Hostname}}
matchers: -type: word words: -"GoAhead" -"cgi-bin" condition:or internal:true
-raw: -| GET /cgi-bin/{{endpoint}}?LD_DEBUG=help HTTP/1.1 Host:{{Hostname}} Accept:*/*