VAR-200202-0014
Vulnerability from variot - Updated: 2023-12-18 12:31GoAhead Web Server 2.1.7 and earlier allows remote attackers to obtain the source code of ASP files via a URL terminated with a /, \, %2f (encoded /), %20 (encoded space), or %00 (encoded null) character, which returns the ASP source code unparsed. This issue is also referenced in VU#124059. GoAhead WebServer contains vulnerabilities that may allow an attacker to view source files containing sensitive information or bypass authentication. The information disclosure vulnerability was previously published as VU#975041. A vulnerability in GoAhead webserver may result in the disclosure of the source code of ASP script files. The vulnerability occurs because the application fails to sanitize HTTP requests. An attacker can append certain characters to the end of an HTTP request for a specific ASP file. As a result, GoAhead webserver will disclose the contents of the requested ASP script file to the attacker. GoAhead WebServer is a small and exquisite embedded Web server of American Embedthis Company, which supports embedding in various devices and applications. Attackers can use this information to further attack the system
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200202-0014",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "webserver",
"scope": "eq",
"trust": 1.6,
"vendor": "goahead",
"version": "2.0"
},
{
"model": "webserver",
"scope": "eq",
"trust": 1.6,
"vendor": "goahead",
"version": "2.1.2"
},
{
"model": "webserver",
"scope": "eq",
"trust": 1.6,
"vendor": "goahead",
"version": "2.1.7"
},
{
"model": "webserver",
"scope": "eq",
"trust": 1.6,
"vendor": "goahead",
"version": "2.1"
},
{
"model": "webserver",
"scope": "eq",
"trust": 1.6,
"vendor": "goahead",
"version": "2.1.3"
},
{
"model": "webserver",
"scope": "eq",
"trust": 1.6,
"vendor": "goahead",
"version": "2.1.4"
},
{
"model": "webserver",
"scope": "eq",
"trust": 1.6,
"vendor": "goahead",
"version": "2.1.6"
},
{
"model": "webserver",
"scope": "eq",
"trust": 1.6,
"vendor": "goahead",
"version": "2.1.1"
},
{
"model": "webserver",
"scope": "eq",
"trust": 1.6,
"vendor": "goahead",
"version": "2.1.5"
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "goahead",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "rockwell automation",
"version": null
},
{
"model": "automation controllogix 1756-enbt/a ethernet/ip bridge",
"scope": "eq",
"trust": 0.3,
"vendor": "rockwell",
"version": "0"
},
{
"model": "software goahead webserver",
"scope": "eq",
"trust": 0.3,
"vendor": "goahead",
"version": "2.1.7"
},
{
"model": "software goahead webserver",
"scope": "eq",
"trust": 0.3,
"vendor": "goahead",
"version": "2.1.6"
},
{
"model": "software goahead webserver",
"scope": "eq",
"trust": 0.3,
"vendor": "goahead",
"version": "2.1.5"
},
{
"model": "software goahead webserver",
"scope": "eq",
"trust": 0.3,
"vendor": "goahead",
"version": "2.1.4"
},
{
"model": "software goahead webserver",
"scope": "eq",
"trust": 0.3,
"vendor": "goahead",
"version": "2.1.3"
},
{
"model": "software goahead webserver",
"scope": "eq",
"trust": 0.3,
"vendor": "goahead",
"version": "2.1.2"
},
{
"model": "software goahead webserver",
"scope": "eq",
"trust": 0.3,
"vendor": "goahead",
"version": "2.1.1"
},
{
"model": "software goahead webserver",
"scope": "eq",
"trust": 0.3,
"vendor": "goahead",
"version": "2.1"
},
{
"model": "software goahead webserver",
"scope": "eq",
"trust": 0.3,
"vendor": "goahead",
"version": "2.0"
},
{
"model": "software goahead webserver",
"scope": "ne",
"trust": 0.3,
"vendor": "goahead",
"version": "2.1.8"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#124059"
},
{
"db": "BID",
"id": "9239"
},
{
"db": "NVD",
"id": "CVE-2002-1603"
},
{
"db": "CNNVD",
"id": "CNNVD-200202-008"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:goahead_software:goahead_webserver:2.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:goahead_software:goahead_webserver:2.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:goahead_software:goahead_webserver:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:goahead_software:goahead_webserver:2.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:goahead_software:goahead_webserver:2.1.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:goahead_software:goahead_webserver:2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:goahead_software:goahead_webserver:2.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:goahead_software:goahead_webserver:2.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:goahead_software:goahead_webserver:2.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2002-1603"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Luigi Auriemma\u203b aluigi@pivx.com",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200202-008"
}
],
"trust": 0.6
},
"cve": "CVE-2002-1603",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-5988",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2002-1603",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#975041",
"trust": 0.8,
"value": "1.91"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#124059",
"trust": 0.8,
"value": "0.06"
},
{
"author": "CNNVD",
"id": "CNNVD-200202-008",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-5988",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#975041"
},
{
"db": "CERT/CC",
"id": "VU#124059"
},
{
"db": "VULHUB",
"id": "VHN-5988"
},
{
"db": "NVD",
"id": "CVE-2002-1603"
},
{
"db": "CNNVD",
"id": "CNNVD-200202-008"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "GoAhead Web Server 2.1.7 and earlier allows remote attackers to obtain the source code of ASP files via a URL terminated with a /, \\, %2f (encoded /), %20 (encoded space), or %00 (encoded null) character, which returns the ASP source code unparsed. This issue is also referenced in VU#124059. GoAhead WebServer contains vulnerabilities that may allow an attacker to view source files containing sensitive information or bypass authentication. The information disclosure vulnerability was previously published as VU#975041. A vulnerability in GoAhead webserver may result in the disclosure of the source code of ASP script files. The vulnerability occurs because the application fails to sanitize HTTP requests. \nAn attacker can append certain characters to the end of an HTTP request for a specific ASP file. As a result, GoAhead webserver will disclose the contents of the requested ASP script file to the attacker. GoAhead WebServer is a small and exquisite embedded Web server of American Embedthis Company, which supports embedding in various devices and applications. Attackers can use this information to further attack the system",
"sources": [
{
"db": "NVD",
"id": "CVE-2002-1603"
},
{
"db": "CERT/CC",
"id": "VU#975041"
},
{
"db": "CERT/CC",
"id": "VU#124059"
},
{
"db": "BID",
"id": "9239"
},
{
"db": "VULHUB",
"id": "VHN-5988"
}
],
"trust": 2.7
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-5988",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-5988"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#975041",
"trust": 3.6
},
{
"db": "CERT/CC",
"id": "VU#124059",
"trust": 2.8
},
{
"db": "BID",
"id": "9239",
"trust": 2.0
},
{
"db": "NVD",
"id": "CVE-2002-1603",
"trust": 2.0
},
{
"db": "SECUNIA",
"id": "7741",
"trust": 1.7
},
{
"db": "OSVDB",
"id": "13295",
"trust": 1.7
},
{
"db": "SECTRACK",
"id": "1005820",
"trust": 1.7
},
{
"db": "EXPLOIT-DB",
"id": "12815",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-200202-008",
"trust": 0.7
},
{
"db": "XF",
"id": "10885",
"trust": 0.6
},
{
"db": "EXPLOIT-DB",
"id": "23446",
"trust": 0.1
},
{
"db": "SEEBUG",
"id": "SSVID-77211",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-5988",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#975041"
},
{
"db": "CERT/CC",
"id": "VU#124059"
},
{
"db": "VULHUB",
"id": "VHN-5988"
},
{
"db": "BID",
"id": "9239"
},
{
"db": "NVD",
"id": "CVE-2002-1603"
},
{
"db": "CNNVD",
"id": "CNNVD-200202-008"
}
]
},
"id": "VAR-200202-0014",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-5988"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T12:31:47.769000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2002-1603"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.3,
"url": "http://data.goahead.com/software/webserver/2.1.8/release.htm#bug-with-urls-like-asp"
},
{
"trust": 3.3,
"url": "http://aluigi.altervista.org/adv/goahead-adv3.txt"
},
{
"trust": 2.8,
"url": "http://www.kb.cert.org/vuls/id/975041"
},
{
"trust": 2.0,
"url": "http://www.kb.cert.org/vuls/id/124059"
},
{
"trust": 2.0,
"url": "http://rockwellautomation.custhelp.com/cgi-bin/rockwellautomation.cfg/php/enduser/std_adp.php?p_faqid=57729"
},
{
"trust": 1.9,
"url": "http://www.procheckup.com/security_info/vuln_pr0213.html"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/9239"
},
{
"trust": 1.7,
"url": "http://www.kb.cert.org/vuls/id/rgii-7mwkz3"
},
{
"trust": 1.7,
"url": "http://www.procheckup.com/pdfs/procheckup_vulns_2002.pdf"
},
{
"trust": 1.7,
"url": "http://www.osvdb.org/13295"
},
{
"trust": 1.7,
"url": "http://securitytracker.com/id?1005820"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/7741"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10885"
},
{
"trust": 0.8,
"url": "http://web.archive.org/web/20030110134751/http://www.procheckup.com/security_info/vuln_pr0213.html"
},
{
"trust": 0.8,
"url": "http://www.ab.com/networks/architectures.html"
},
{
"trust": 0.8,
"url": "http://data.goahead.com/software/webserver/2.1.8/release.htm#security-features-can-be-bypassed-by-adding-an-extra-slash-in-the-url-bug01518"
},
{
"trust": 0.8,
"url": "http://www.nerc.com/fileuploads/file/events%20analysis/a-2009-02-13-01.pdf"
},
{
"trust": 0.8,
"url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/57729"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=goahead+web+server"
},
{
"trust": 0.8,
"url": "http://www.exploit-db.com/exploits/12815/"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/10885"
},
{
"trust": 0.3,
"url": "http://www.goahead.com/webserver/webserver.htm"
},
{
"trust": 0.3,
"url": "/archive/1/347805"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#975041"
},
{
"db": "CERT/CC",
"id": "VU#124059"
},
{
"db": "VULHUB",
"id": "VHN-5988"
},
{
"db": "BID",
"id": "9239"
},
{
"db": "NVD",
"id": "CVE-2002-1603"
},
{
"db": "CNNVD",
"id": "CNNVD-200202-008"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#975041"
},
{
"db": "CERT/CC",
"id": "VU#124059"
},
{
"db": "VULHUB",
"id": "VHN-5988"
},
{
"db": "BID",
"id": "9239"
},
{
"db": "NVD",
"id": "CVE-2002-1603"
},
{
"db": "CNNVD",
"id": "CNNVD-200202-008"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2002-12-17T00:00:00",
"db": "CERT/CC",
"id": "VU#975041"
},
{
"date": "2009-02-05T00:00:00",
"db": "CERT/CC",
"id": "VU#124059"
},
{
"date": "2002-02-13T00:00:00",
"db": "VULHUB",
"id": "VHN-5988"
},
{
"date": "2003-12-17T00:00:00",
"db": "BID",
"id": "9239"
},
{
"date": "2002-02-13T05:00:00",
"db": "NVD",
"id": "CVE-2002-1603"
},
{
"date": "2002-02-13T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200202-008"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2010-01-11T00:00:00",
"db": "CERT/CC",
"id": "VU#975041"
},
{
"date": "2010-06-22T00:00:00",
"db": "CERT/CC",
"id": "VU#124059"
},
{
"date": "2017-07-11T00:00:00",
"db": "VULHUB",
"id": "VHN-5988"
},
{
"date": "2009-02-19T21:47:00",
"db": "BID",
"id": "9239"
},
{
"date": "2017-07-11T01:29:16.180000",
"db": "NVD",
"id": "CVE-2002-1603"
},
{
"date": "2009-02-10T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200202-008"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200202-008"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "GoAhead Web Server discloses source code of ASP files via crafted URL",
"sources": [
{
"db": "CERT/CC",
"id": "VU#975041"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200202-008"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.