CVE-2017-17562

Summary

CVECVE-2017-17562
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2017-12-12 19:29:00 UTC
Updated2018-04-20 01:29:00 UTC
DescriptionEmbedthis GoAhead before 3.6.5 allows remote code execution if CGI is enabled and a CGI program is dynamically linked. This is a result of initializing the environment of forked CGI scripts using untrusted HTTP request parameters in the cgiHandler function in cgi.c. When combined with the glibc dynamic linker, this behaviour can be abused for remote code execution using special parameter names such as LD_PRELOAD. An attacker can POST their shared object payload in the body of the request, and reference it using /proc/self/fd/0.

Risk And Classification

EPSS: 0.943120000 probability, percentile 0.999480000 (date 2026-04-01)

CISA KEV: Listed on 2021-12-10; due 2022-06-10; ransomware use Unknown

Problem Types: CWE-20

CISA Known Exploited Vulnerability

VendorEmbedthis
ProductGoAhead
NameEmbedthis GoAhead Remote Code Execution Vulnerability
Required ActionApply updates per vendor instructions.
Noteshttps://nvd.nist.gov/vuln/detail/CVE-2017-17562

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Embedthis Goahead All All All All
Application Embedthis Goahead All All All All

References

ReferenceSourceLinkTags
elttam - Remote LD_PRELOAD Exploitation MISC www.elttam.com.au Exploit, Patch, Third Party Advisory
github.com/embedthis/goahead/commit/6f786c123196eb622625a920d54048629a7c... MISC github.com Patch, Third Party Advisory
advisories/CVE-2017-17562 at master · elttam/advisories · GitHub MISC github.com Third Party Advisory
Solaris Multiple Flaws Let Remote and Local Users Deny Service, Remote and Local Users Access Data, Remote Authenticated Users Gain Elevated Privileges, and Remote Authenticated and Local Users Modify Data - SecurityTracker SECTRACK www.securitytracker.com
Oracle Critical Patch Update - April 2018 CONFIRM www.oracle.com
GoAhead Web Server 2.5 < 3.6.5 - HTTPd 'LD_PRELOAD' Arbitrary Module Load (Metasploit) - Multiple remote Exploit EXPLOIT-DB www.exploit-db.com
GoAhead Web Server 2.5 < 3.6.5 - HTTPd 'LD_PRELOAD' Remote Code Execution - Linux remote Exploit EXPLOIT-DB www.exploit-db.com Exploit, Third Party Advisory, VDB Entry
github.com/embedthis/goahead/issues/249 MISC github.com Issue Tracking, Third Party Advisory
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
CISA Known Exploited Vulnerabilities catalog CISA www.cisa.gov kev

Legacy QID Mappings

  • 590949 General Electric Renewable Energy MDS Radios Multiple Vulnerabilities (ICSA-22-090-06)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report