CVE-2026-34581

goshs · goshs

A vulnerability in goshs, a SimpleHTTPServer written in Go, could allow for unauthorized file access or remote exploitation.

Executive summary

The goshs HTTP server is affected by a high-severity vulnerability that could allow attackers to access sensitive files or compromise the host system.

Vulnerability

goshs is a SimpleHTTPServer implementation. The vulnerability, which carries a CVSS score of 8.1, likely involves a path traversal or an unauthenticated file disclosure flaw, allowing an attacker to read files outside of the web root directory.

Business impact

If goshs is used to serve files in a development or production environment, an attacker could exploit this flaw to steal source code, configuration files, or sensitive credentials. The high CVSS score reflects a serious threat to data confidentiality. System compromise is also possible if the attacker can read sensitive system files like /etc/passwd or SSH keys.

Remediation

Immediate Action: Stop using vulnerable versions of goshs and update to the latest patched version immediately.

Proactive Monitoring: Monitor network traffic for unusual GET requests containing directory traversal patterns (e.g., "../") and review server access logs.

Compensating Controls: Run the HTTP server with the lowest possible OS privileges and use containerization to isolate the server from the host file system.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Apply the necessary updates immediately to secure the goshs server. If the server is not strictly required for business operations, consider disabling it or replacing it with a more robust, hardened web server implementation.