Double Free and Use After Free (UAF)

CVE-2024-3187

Summary

This issue tracks 2 Use After Free (UAFs) vulnerabilities and 1 Double Free vulnerability discovered in Goahead versions <= 6.0.0. These issues are caused by JST values not being nulled when they get freed while performing parsing operation over JST templates. This issue occurs when attempting to process malicious JST server-side templates.

Impact

In case the ME_GOAHEAD_JAVASCRIPT compilation flag is enabled and a malicious user is capable of controlling the content of JST templates interpreted at runtime, a remote attacker may attempt to leverage the memory corruptions to either trigger a crash and cause a Denial of Service (DoS) condition over the service or attempt to gain code execution. The latter scenario is extremely context dependent and is not guaranteed to succeed.

Issue Date

October 14, 2024

Affects

GoAhead <= 6.0.0

CVE Name

CVE-2024-3187

CVSS Details

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H

CVSS Score

5.9

Solution

It is recommended to apply fixes introduced in version 6.0.1 of GoAhead and use the latest version available as base for building custom web servers.

Mitigations

Acknowledgements

Diego Zaffaroni of Nozomi Networks

Nozomi Threat Intelligence

Nozomi Networks Labs curates threat and vulnerability insights that are continuously fed into the Nozomi Networks platform to ensure our sensors can detect existing and emerging threats and vulnerabilities that threaten customers environments.

Learn more

Latest Labs Blogs

Breaking the Encryption: Analyzing the AutomationDirect CLICK Plus PLC Protocol 

Read

Lights Out: How One Tiny Message Can Crash Your Shelly Pro 4PM and Lock You Out of Your Smart Home

Read

Hacking the Engineer’s Workstation: Compromising AutomationDirect Productivity Suite to Breach the OT Perimeter

Read
View All

Take the next step.

Discover how easy it is to identify and respond to cyber threats by automating your OT and IoT asset discovery, inventory, and management.