mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-30 18:56:19 +00:00
36 lines
1.5 KiB
Markdown
36 lines
1.5 KiB
Markdown
|
|
### [CVE-2021-42342](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42342)
|
||
|
|

|
||
|
|

|
||
|
|

|
||
|
|
|
||
|
|
### Description
|
||
|
|
|
||
|
|
An issue was discovered in GoAhead 4.x and 5.x before 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerable CGI scripts.
|
||
|
|
|
||
|
|
### POC
|
||
|
|
|
||
|
|
#### Reference
|
||
|
|
No PoCs from references.
|
||
|
|
|
||
|
|
#### Github
|
||
|
|
- https://github.com/20142995/pocsuite3
|
||
|
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
|
- https://github.com/Mr-xn/CVE-2021-42342
|
||
|
|
- https://github.com/NaInSec/CVE-PoC-in-GitHub
|
||
|
|
- https://github.com/SYRTI/POC_to_review
|
||
|
|
- https://github.com/Threekiii/Awesome-POC
|
||
|
|
- https://github.com/Threekiii/Vulhub-Reproduce
|
||
|
|
- https://github.com/WhooAmii/POC_to_review
|
||
|
|
- https://github.com/bakery312/Vulhub-Reproduce
|
||
|
|
- https://github.com/binganao/vulns-2022
|
||
|
|
- https://github.com/d4n-sec/d4n-sec.github.io
|
||
|
|
- https://github.com/ijh4723/-zeroboo-Gohead-CVE-2021-42342-1
|
||
|
|
- https://github.com/ijh4723/whitehat-school-vulhu
|
||
|
|
- https://github.com/kimusan/goahead-webserver-pre-5.1.5-RCE-PoC-CVE-2021-42342-
|
||
|
|
- https://github.com/n1sh1th/CVE-POC
|
||
|
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||
|
|
- https://github.com/soosmile/POC
|
||
|
|
- https://github.com/trhacknon/Pocingit
|
||
|
|
- https://github.com/zecool/cve
|
||
|
|
|