Description
Multiple cross-site scripting (XSS) vulnerabilities in GoAhead Webserver 2.18 allow remote attackers to inject arbitrary web script or HTML via (1) the group parameter to goform/AddGroup, related to addgroup.asp; (2) the url parameter to goform/AddAccessLimit, related to addlimit.asp; or the (3) user (aka User ID) or (4) group parameter to goform/AddUser, related to adduser.asp.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Silent Dream · textremotewindows
https://www.exploit-db.com/exploits/36219
exploitdb
WORKING POC
VERIFIED
by Silent Dream · textremotewindows
https://www.exploit-db.com/exploits/36218
exploitdb
WORKING POC
VERIFIED
by Silent Dream · textremotewindows
https://www.exploit-db.com/exploits/36217
References (3)
Core 3
Core References
Exploit, US Government Resource third-party-advisory
x_refsource_cert-vn
http://www.kb.cert.org/vuls/id/384427
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/70434
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/46894
Scores
EPSS
0.0105
EPSS Percentile
77.7%
Details
CWE
CWE-79
Status
published
Products (1)
goahead/goahead_webserver
2.1.8
Published
Nov 03, 2011
Tracked Since
Feb 18, 2026