A vulnerability, which was classified as critical, has been found in Gowabby HFish 0.1. This issue affects the function LoadUrl of the file \view\url.go. The manipulation of the argument r leads to improper authentication. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
https://vuldb.com/?id.310349 | vdb entry technical description |
https://vuldb.com/?ctiid.310349 | signature permissions required |
https://vuldb.com/?submit.584798 | third party advisory |
https://github.com/A7cc/cve/issues/5 | issue tracking exploit |