Home

Description

goshs is a SimpleHTTPServer written in Go. From 2.0.0-beta.4 to 2.0.0-beta.5, goshs leaks file-based ACL credentials through its public collaborator feed when the server is deployed without global basic auth. Requests to .goshs-protected folders are logged before authorization is enforced, and the collaborator websocket broadcasts raw request headers, including Authorization. An unauthenticated observer can capture a victim's folder-specific basic-auth header and replay it to read, upload, overwrite, and delete files inside the protected subtree. This vulnerability is fixed in 2.0.0-beta.6.

PUBLISHED Reserved 2026-04-15 | Published 2026-04-21 | Updated 2026-04-21 | Assigner GitHub_M




HIGH: 7.7CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Product status

>= 2.0.0-beta.4, < 2.0.0-beta.6
affected

References

github.com/.../goshs/security/advisories/GHSA-7h3j-592v-jcrp exploit

github.com/.../goshs/security/advisories/GHSA-7h3j-592v-jcrp

cve.org (CVE-2026-40885)

nvd.nist.gov (CVE-2026-40885)

Download JSON