Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-42342 PoC — GoAhead 代码问题漏洞

Source
Associated Vulnerability
Title:GoAhead 代码问题漏洞 (CVE-2021-42342)
Description:An issue was discovered in GoAhead 4.x and 5.x before 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerable CGI scripts.
Readme
# -zeroboo-Gohead-CVE-2021-42342-1
File Snapshot

[4.0K] /data/pocs/95eeddede1f17139f9456ca7e88e7239df9d97e1 └── [ 34] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →