Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
goshs has a file-based ACL authorization bypass in goshs state-changing routes
Vulnerability Description
goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.4, goshs enforces the documented per-folder .goshs ACL/basic-auth mechanism for directory listings and file reads, but it does not enforce the same authorization checks for state-changing routes. An unauthenticated attacker can upload files with PUT, upload files with multipart POST /upload, create directories with ?mkdir, and delete files with ?delete inside a .goshs-protected directory. By deleting the .goshs file itself, the attacker can remove the folder's auth policy and then access previously protected content without credentials. This results in a critical authorization bypass affecting confidentiality, integrity, and availability. This vulnerability is fixed in 2.0.0-beta.4.
CVSS Information
N/A
Vulnerability Type
授权机制缺失
Vulnerability Title
goshs 安全漏洞
Vulnerability Description
goshs是Patrick Hener个人开发者的一个用Go编写的简单HTTP Server。 goshs 2.0.0-beta.4之前版本存在安全漏洞,该漏洞源于未对状态更改路由强制执行相同的授权检查,可能导致未经身份验证的攻击者在受.goshs保护的目录内上传、创建目录、删除文件,并通过删除.goshs文件本身移除文件夹的认证策略,从而绕过授权。
CVSS Information
N/A
Vulnerability Type
N/A