CVE-2017-17562

KEV
Published: Dic 12, 2017 Last Modified: Ott 22, 2025
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 8,1
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high
MEDIUM 6,8
Access Vector: network
Access Complexity: medium
Authentication: none
Confidentiality: partial
Integrity: partial
Availability: partial

Description

AI Translation Available

Embedthis GoAhead before 3.6.5 allows remote code execution if CGI is enabled and a CGI program is dynamically linked. This is a result of initializing the environment of forked CGI scripts using untrusted HTTP request parameters in the cgiHandler function in cgi.c. When combined with the glibc dynamic linker, this behaviour can be abused for remote code execution using special parameter names such as LD_PRELOAD. An attacker can POST their shared object payload in the body of the request, and reference it using /proc/self/fd/0.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,9413
Percentile
1,0th
Updated

EPSS Score Trend (Last 90 Days)

Exploit

GoAhead Web Server 2.5 < 3.6.5 - HTTPd …

Verified

GoAhead Web Server 2.5 < 3.6.5 - HTTPd 'LD_PRELOAD' Remote Code Execution

View Exploit Code →
Exploit

GoAhead Web Server 2.5 < 3.6.5 - HTTPd …

Verified Metasploit Framework (MSF)

GoAhead Web Server 2.5 < 3.6.5 - HTTPd 'LD_PRELOAD' Arbitrary Module Load (Metasploit)

View Exploit Code →
Application

Integrated Lights Out Manager by Oracle

cpe:2.3:a:oracle:integrated_lights_out_manager:4.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Goahead by Embedthis

Version Range Affected
To 3.6.5 (exclusive)
cpe:2.3:a:embedthis:goahead:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Integrated Lights Out Manager by Oracle

cpe:2.3:a:oracle:integrated_lights_out_manager:3.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017…
https://github.com/elttam/advisories/tree/master/CVE-2017-17562
https://github.com/embedthis/goahead/commit/6f786c123196eb622625a920d54048629a7…
https://github.com/embedthis/goahead/issues/249
https://www.elttam.com.au/blog/goahead/
https://www.exploit-db.com/exploits/43360/
https://www.exploit-db.com/exploits/43877/
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securitytracker.com/id/1040702
https://github.com/elttam/advisories/tree/master/CVE-2017-17562
https://github.com/embedthis/goahead/commit/6f786c123196eb622625a920d54048629a7…
https://github.com/embedthis/goahead/issues/249
https://www.elttam.com.au/blog/goahead/
https://www.exploit-db.com/exploits/43360/
https://www.exploit-db.com/exploits/43877/
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securitytracker.com/id/1040702