漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
goshs: Public collaborator feed leaks .goshs ACL credentials and enables unauthorized access
Vulnerability Description
goshs is a SimpleHTTPServer written in Go. From 2.0.0-beta.4 to 2.0.0-beta.5, goshs leaks file-based ACL credentials through its public collaborator feed when the server is deployed without global basic auth. Requests to .goshs-protected folders are logged before authorization is enforced, and the collaborator websocket broadcasts raw request headers, including Authorization. An unauthenticated observer can capture a victim's folder-specific basic-auth header and replay it to read, upload, overwrite, and delete files inside the protected subtree. This vulnerability is fixed in 2.0.0-beta.6.
CVSS Information
N/A
Vulnerability Type
信息暴露
Vulnerability Title
goshs 安全漏洞
Vulnerability Description
goshs是Patrick Hener个人开发者的一个用Go编写的简单HTTP Server。 goshs 2.0.0-beta.4至2.0.0-beta.5版本存在安全漏洞,该漏洞源于在未部署全局基本身份验证时,协作WebSocket广播原始请求标头,可能导致未经身份验证的观察者捕获并重放受害者特定文件夹的基本身份验证标头。
CVSS Information
N/A
Vulnerability Type
N/A