47439
47439
47439
An issue was discovered in GoAhead web server version 2.5.0 (may be affected on
other versions too). The values of the 'Host' headers are implicitly set as trusted
while this should be forbidden, leading to potential host header injection attack
and also the affected hosts can be used for domain fronting. This means affected
hosts can be used by attackers to hide behind during various other attack
POC: 1
Request:
username=admin&password=admin&language=english
Response:
POC: 2
Request:
restoreUrl=&errorCollector=&ModuleTable=OK&rlPhdModuleTable
%24VT=OK&rlPhdModuleStackUnit%24VT=Type%3D0%3BAccess%3D1%3BNumOfEnumerations
%3D0%3BRange0%3D%5B-2147483648%2C2147483647%5D&rlPhdModuleIndex%24VT=Type
%3D0%3BAccess%3D1%3BNumOfEnumerations%3D0%3BRange0%3D%5B-
2147483648%2C2147483647%5D&rlPhdModuleType%24VT=Type%3D0%3BAccess
%3D1%3BNumOfEnumerations%3D0%3BRange0%3D%5B-
2147483648%2C2147483647%5D&rlPhdModuleNumberOfPorts%24VT=Type%3D0%3BAccess
%3D1%3BNumOfEnumerations%3D0%3BRange0%3D%5B-2147483648%2C2147483647%5D&ModuleTable
%24endVT=OK&rlPhdModuleStackUnit%24repeat%3F1=1&rlPhdModuleIndex%24repeat
%3F1=1&rlPhdModuleType%24repeat%3F1=47&rlPhdModuleNumberOfPorts%24repeat
%3F1=28&ModuleTable%24endRepeat%3F1=OK&userName%24query=%24enab15%24&password
%24query=admin&x=0&y=0
Response:
<html><head></head><body>
This document has moved to a new <a
href="http://google.com:443/config/accessnotallowedpage.htm">location</a>.
Please update your documents to reflect the new location.
</body></html>
POC: 3
Initial Investigation:
Potentially affected Part of the source code in GoAhead web server is in the
’http.c’ file, which contains 'host' parameter.
https://github.com/embedthis/goahead/blob/master/src/http.c