The HTTP Digest Authentication in the GoAhead web server before 5.1.2 does not completely protect against replay attacks. This allows an unauthenticated remote attacker to bypass authentication via capture-replay if TLS is not used to protect the underlying communication channel.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/159505/EmbedThis-GoAhead-Web-Server-5.1.1-Digest-Authentication-Capture-Replay-Nonce-Reuse.html | Exploit Third Party Advisory VDB Entry |
https://github.com/embedthis/goahead-gpl/issues/3 | Third Party Advisory |
https://github.com/embedthis/goahead-gpl/issues/3 | Third Party Advisory |
http://packetstormsecurity.com/files/159505/EmbedThis-GoAhead-Web-Server-5.1.1-Digest-Authentication-Capture-Replay-Nonce-Reuse.html | Exploit Third Party Advisory VDB Entry |
https://github.com/embedthis/goahead-gpl/issues/3 | Third Party Advisory |
https://github.com/embedthis/goahead-gpl/issues/3 | Third Party Advisory |
Configurations
History
21 Nov 2024, 05:06
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/159505/EmbedThis-GoAhead-Web-Server-5.1.1-Digest-Authentication-Capture-Replay-Nonce-Reuse.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://github.com/embedthis/goahead-gpl/issues/3 - Third Party Advisory |
Information
Published : 2020-07-23 13:15
Updated : 2024-11-21 05:06
NVD link : CVE-2020-15688
Mitre link : CVE-2020-15688
CVE.ORG link : CVE-2020-15688
JSON object : View
Products Affected
embedthis
- goahead
CWE
CWE-294
Authentication Bypass by Capture-replay