CVE-2026-35471

goshs · goshs

The goshs SimpleHTTPServer exhibits a path traversal flaw in the file deletion function due to improper handling of return values.

Executive summary

A path traversal vulnerability in goshs allows remote attackers to delete arbitrary files on the host system, threatening system availability.

Vulnerability

The deleteFile() function fails to return after a path traversal check, causing the application to proceed with the deletion operation despite the check failing.

Business impact

An attacker can delete sensitive system files, leading to a denial-of-service or the destruction of critical data. With a CVSS score of 9.8, this flaw represents a significant risk to system stability and integrity.

Remediation

Immediate Action: Update goshs to version 2.0.0-beta.3 or later.

Proactive Monitoring: Monitor logs for unauthorized file deletion attempts and unexpected service outages.

Compensating Controls: Ensure the service account has minimal filesystem permissions, restricted only to the directories required for operation.

Exploitation status

Public Exploit Available: Unknown

Analyst recommendation

The failure to properly handle validation returns is a critical logic error. Administrators must update to the latest version immediately to ensure that path validation is enforced correctly.