Description
goshs is a SimpleHTTPServer written in Go. From 2.0.0-beta.4 to 2.0.0-beta.5, goshs leaks file-based ACL credentials through its public collaborator feed when the server is deployed without global basic auth. Requests to .goshs-protected folders are logged before authorization is enforced, and the collaborator websocket broadcasts raw request headers, including Authorization. An unauthenticated observer can capture a victim's folder-specific basic-auth header and replay it to read, upload, overwrite, and delete files inside the protected subtree. This vulnerability is fixed in 2.0.0-beta.6.
INFO
Published Date :
2026-04-21T19:40:37.272Z
Last Modified :
2026-04-21T20:05:26.627Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-40885 vulnerability.
| Vendors | Products |
|---|---|
| Patrickhener |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-40885.