CVE-2026-40884
🔴 Łataj teraz
Obejście uwierzytelnienia w goshs pozwala na dostęp do SFTP bez hasła.
CVSS
9.8
EPSS
0.1%
Exploit
poc
Vendor
goshs
Opis źródłowy (NVD)
goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.6, goshs contains an SFTP authentication bypass when the documented empty-username basic-auth syntax is used. If the server is started with -b ':pass' together with -sftp, goshs accepts that configuration but does not install any SFTP password handler. As a result, an unauthenticated network attacker can connect to the SFTP service and access files without a password. This vulnerability is fixed in 2.0.0-beta.6.
auth-bypass exploit
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.8 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.1% |
| Opublikowano (NVD) | 2026-04-21 20:17:02 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-27 14:55:18 UTC |
Referencje
- https://github.com/patrickhener/goshs/security/advisories/GHSA-c29w-qq4m-2gcv (security-advisories@github.com) [Exploit, Vendor Advisory]