ID

VAR-201912-0787


CVE

CVE-2019-5096


TITLE

GoAhead web  Use of freed memory vulnerability in server applications

Trust: 0.8

sources: JVNDB: JVNDB-2019-012628

DESCRIPTION

An exploitable code execution vulnerability exists in the processing of multi-part/form-data requests within the base GoAhead web server application in versions v5.0.1, v.4.1.1 and v3.6.5. A specially crafted HTTP request can lead to a use-after-free condition during the processing of this request that can be used to corrupt heap structures that could lead to full code execution. The request can be unauthenticated in the form of GET or POST requests, and does not require the requested resource to exist on the server. GoAhead web Server applications contain a usage of freed memory vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Embedthis Software GoAhead is an embedded Web server of American Embedthis Software company. Attackers can exploit this vulnerability to damage the heap structure and execute code

Trust: 1.8

sources: NVD: CVE-2019-5096 // JVNDB: JVNDB-2019-012628 // VULHUB: VHN-156531 // VULMON: CVE-2019-5096

AFFECTED PRODUCTS

vendor:embedthismodel:goaheadscope:eqversion:4.1.1

Trust: 1.8

vendor:embedthismodel:goaheadscope:eqversion:5.0.1

Trust: 1.8

vendor:embedthismodel:goaheadscope:eqversion:3.6.5

Trust: 1.8

vendor:embedthismodel:goaheadscope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2019-012628 // NVD: CVE-2019-5096

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-5096
value: CRITICAL

Trust: 1.0

talos-cna@cisco.com: CVE-2019-5096
value: CRITICAL

Trust: 1.0

NVD: CVE-2019-5096
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201912-058
value: CRITICAL

Trust: 0.6

VULHUB: VHN-156531
value: HIGH

Trust: 0.1

VULMON: CVE-2019-5096
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-5096
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-156531
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

talos-cna@cisco.com: CVE-2019-5096
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

nvd@nist.gov: CVE-2019-5096
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-156531 // VULMON: CVE-2019-5096 // JVNDB: JVNDB-2019-012628 // CNNVD: CNNVD-201912-058 // NVD: CVE-2019-5096 // NVD: CVE-2019-5096

PROBLEMTYPE DATA

problemtype:CWE-416

Trust: 1.1

problemtype:Use of freed memory (CWE-416) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-156531 // JVNDB: JVNDB-2019-012628 // NVD: CVE-2019-5096

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201912-058

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201912-058

PATCH

title:GoAheadurl:https://www.embedthis.com/goahead/

Trust: 0.8

title:Embedthis Software GoAhead Remediation of resource management error vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=103856

Trust: 0.6

title:CVE-2019-5096-GoAhead-Web-Server-Dos-Exploiturl:https://github.com/papinnon/CVE-2019-5096-GoAhead-Web-Server-Dos-Exploit

Trust: 0.1

title:SecBooksurl:https://github.com/SexyBeast233/SecBooks

Trust: 0.1

title:CVE-POCurl:https://github.com/0xT11/CVE-POC

Trust: 0.1

title:PoCurl:https://github.com/Jonathan-Elias/PoC

Trust: 0.1

title:PoC-in-GitHuburl:https://github.com/developer3000S/PoC-in-GitHub

Trust: 0.1

title:PoC-in-GitHuburl:https://github.com/hectorgie/PoC-in-GitHub

Trust: 0.1

title:PoC-in-GitHuburl:https://github.com/nomi-sec/PoC-in-GitHub

Trust: 0.1

sources: VULMON: CVE-2019-5096 // JVNDB: JVNDB-2019-012628 // CNNVD: CNNVD-201912-058

EXTERNAL IDS

db:NVDid:CVE-2019-5096

Trust: 3.4

db:TALOSid:TALOS-2019-0888

Trust: 2.6

db:JVNid:JVNVU93901424

Trust: 0.8

db:JVNDBid:JVNDB-2019-012628

Trust: 0.8

db:CNNVDid:CNNVD-201912-058

Trust: 0.7

db:AUSCERTid:ESB-2023.0511

Trust: 0.6

db:VULHUBid:VHN-156531

Trust: 0.1

db:ICS CERTid:ICSA-23-026-06

Trust: 0.1

db:VULMONid:CVE-2019-5096

Trust: 0.1

sources: VULHUB: VHN-156531 // VULMON: CVE-2019-5096 // JVNDB: JVNDB-2019-012628 // CNNVD: CNNVD-201912-058 // NVD: CVE-2019-5096

REFERENCES

url:https://talosintelligence.com/vulnerability_reports/talos-2019-0888

Trust: 2.6

url:https://nvd.nist.gov/vuln/detail/cve-2019-5096

Trust: 1.4

url:https://jvn.jp/vu/jvnvu93901424/

Trust: 0.8

url:https://www.talosintelligence.com/vulnerability_reports/talos-2019-0888

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.0511

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/416.html

Trust: 0.1

url:https://github.com/papinnon/cve-2019-5096-goahead-web-server-dos-exploit

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.cisa.gov/uscert/ics/advisories/icsa-23-026-06

Trust: 0.1

url:https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/111096

Trust: 0.1

sources: VULHUB: VHN-156531 // VULMON: CVE-2019-5096 // JVNDB: JVNDB-2019-012628 // CNNVD: CNNVD-201912-058 // NVD: CVE-2019-5096

CREDITS

Discovered by a member of Cisco Talos.

Trust: 0.6

sources: CNNVD: CNNVD-201912-058

SOURCES

db:VULHUBid:VHN-156531
db:VULMONid:CVE-2019-5096
db:JVNDBid:JVNDB-2019-012628
db:CNNVDid:CNNVD-201912-058
db:NVDid:CVE-2019-5096

LAST UPDATE DATE

2024-11-23T22:25:39.645000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-156531date:2019-12-06T00:00:00
db:VULMONid:CVE-2019-5096date:2022-06-17T00:00:00
db:JVNDBid:JVNDB-2019-012628date:2023-01-30T08:58:00
db:CNNVDid:CNNVD-201912-058date:2023-01-28T00:00:00
db:NVDid:CVE-2019-5096date:2024-11-21T04:44:20.800

SOURCES RELEASE DATE

db:VULHUBid:VHN-156531date:2019-12-03T00:00:00
db:VULMONid:CVE-2019-5096date:2019-12-03T00:00:00
db:JVNDBid:JVNDB-2019-012628date:2019-12-09T00:00:00
db:CNNVDid:CNNVD-201912-058date:2019-12-02T00:00:00
db:NVDid:CVE-2019-5096date:2019-12-03T22:15:14.823