CVE-2026-35392

goshs · goshs

The goshs SimpleHTTPServer fails to sanitize file paths during PUT uploads, enabling arbitrary file write/overwrite.

Executive summary

An arbitrary file write vulnerability in goshs allows remote attackers to upload or overwrite files on the host system, potentially leading to full system compromise.

Vulnerability

The PUT upload functionality in httpserver/updown.go lacks path sanitization. An attacker can supply malicious paths to write files outside the intended directory.

Business impact

This vulnerability allows attackers to overwrite critical configuration files or upload web shells, leading to arbitrary code execution. With a CVSS score of 9.8, this constitutes a severe risk to the availability and integrity of the hosting server.

Remediation

Immediate Action: Update goshs to version 2.0.0-beta.3 or later.

Proactive Monitoring: Monitor web server logs for suspicious PUT requests containing directory traversal sequences (e.g., ../).

Compensating Controls: Run the service with the least privilege possible and use filesystem-level restrictions to prevent unauthorized writes to sensitive directories.

Exploitation status

Public Exploit Available: Unknown

Analyst recommendation

The lack of path sanitization is a critical oversight. Administrators must upgrade to the latest beta version immediately and ensure that the service is isolated from sensitive system paths.