GoAhead Web Server 2.1.7 and earlier allows remote attackers to obtain the source code of ASP files via a URL terminated with a /, , %2f (encoded /), %20 (encoded space), or %00 (encoded null) character, which returns the ASP source code unparsed.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Goahead_webserver | Goahead_software | 2.0 (including) | 2.0 (including) |
Goahead_webserver | Goahead_software | 2.1 (including) | 2.1 (including) |
Goahead_webserver | Goahead_software | 2.1.1 (including) | 2.1.1 (including) |
Goahead_webserver | Goahead_software | 2.1.2 (including) | 2.1.2 (including) |
Goahead_webserver | Goahead_software | 2.1.3 (including) | 2.1.3 (including) |
Goahead_webserver | Goahead_software | 2.1.4 (including) | 2.1.4 (including) |
Goahead_webserver | Goahead_software | 2.1.5 (including) | 2.1.5 (including) |
Goahead_webserver | Goahead_software | 2.1.6 (including) | 2.1.6 (including) |
Goahead_webserver | Goahead_software | 2.1.7 (including) | 2.1.7 (including) |