goshs is a SimpleHTTPServer written in Go. Starting in version 0.3.4 and prior to version 1.0.5, running goshs without arguments makes it possible for anyone to execute commands on the server. The function `dispatchReadPump` does not checks the option cli `-c`, thus allowing anyone to execute arbitrary command through the use of websockets. Version 1.0.5 fixes the issue.
History

Tue, 06 May 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 06 May 2025 19:00:00 +0000

Type Values Removed Values Added
Description goshs is a SimpleHTTPServer written in Go. Starting in version 0.3.4 and prior to version 1.0.5, running goshs without arguments makes it possible for anyone to execute commands on the server. The function `dispatchReadPump` does not checks the option cli `-c`, thus allowing anyone to execute arbitrary command through the use of websockets. Version 1.0.5 fixes the issue.
Title goshs route not protected, allows command execution
Weaknesses CWE-284
CWE-77
References
Metrics cvssV3_0

{'score': 9.4, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-05-06T18:41:58.035Z

Updated: 2025-05-06T19:23:18.087Z

Reserved: 2025-04-30T19:41:58.133Z

Link: CVE-2025-46816

cve-icon Vulnrichment

Updated: 2025-05-06T19:21:07.929Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-05-06T19:16:00.080

Modified: 2025-05-07T14:13:20.483

Link: CVE-2025-46816

cve-icon Redhat

No data.