CVE-2011-4273

GoAhead Webserver 2.18 - XSS

Title source: llm
STIX 2.1

Description

Multiple cross-site scripting (XSS) vulnerabilities in GoAhead Webserver 2.18 allow remote attackers to inject arbitrary web script or HTML via (1) the group parameter to goform/AddGroup, related to addgroup.asp; (2) the url parameter to goform/AddAccessLimit, related to addlimit.asp; or the (3) user (aka User ID) or (4) group parameter to goform/AddUser, related to adduser.asp.

Exploits (3)

exploitdb WORKING POC VERIFIED
by Silent Dream · textremotewindows
https://www.exploit-db.com/exploits/36219
exploitdb WORKING POC VERIFIED
by Silent Dream · textremotewindows
https://www.exploit-db.com/exploits/36218
exploitdb WORKING POC VERIFIED
by Silent Dream · textremotewindows
https://www.exploit-db.com/exploits/36217

References (3)

Core 3
Core References
Exploit, US Government Resource third-party-advisory x_refsource_cert-vn
http://www.kb.cert.org/vuls/id/384427
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/70434
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/46894

Scores

EPSS 0.0105
EPSS Percentile 77.7%

Details

CWE
CWE-79
Status published
Products (1)
goahead/goahead_webserver 2.1.8
Published Nov 03, 2011
Tracked Since Feb 18, 2026