CVE-2026-35471
goshs · goshs
The goshs SimpleHTTPServer exhibits a path traversal flaw in the file deletion function due to improper handling of return values.
Executive summary
A path traversal vulnerability in goshs allows remote attackers to delete arbitrary files on the host system, threatening system availability.
Vulnerability
The deleteFile() function fails to return after a path traversal check, causing the application to proceed with the deletion operation despite the check failing.
Business impact
An attacker can delete sensitive system files, leading to a denial-of-service or the destruction of critical data. With a CVSS score of 9.8, this flaw represents a significant risk to system stability and integrity.
Remediation
Immediate Action: Update goshs to version 2.0.0-beta.3 or later.
Proactive Monitoring: Monitor logs for unauthorized file deletion attempts and unexpected service outages.
Compensating Controls: Ensure the service account has minimal filesystem permissions, restricted only to the directories required for operation.
Exploitation status
Public Exploit Available: Unknown
Analyst recommendation
The failure to properly handle validation returns is a critical logic error. Administrators must update to the latest version immediately to ensure that path validation is enforced correctly.