CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ⬡ Vulnerabilities & CVEs Apr 07, 2026

CVE-2026-35392 | patrickhener goshs up to 2.0.0-beta.2 httpserver/updown.go path traversal (GHSA-g8mv-vp7j-qp64)

VulDB Archived Apr 07, 2026 ✓ Full text saved

A vulnerability marked as critical has been reported in patrickhener goshs up to 2.0.0-beta.2 . Affected is an unknown function of the file httpserver/updown.go . Performing a manipulation results in path traversal. This vulnerability is known as CVE-2026-35392 . Remote exploitation of the attack is possible. No exploit is available. It is suggested to upgrade the affected component.

Full text archived locally
✦ AI Summary · Claude Sonnet


    VDB-355696 · CVE-2026-35392 · GHSA-G8MV-VP7J-QP64 PATRICKHENER GOSHS UP TO 2.0.0-BETA.2 HTTPSERVER/UPDOWN.GO PATH TRAVERSAL HISTORYDIFFRELATEJSONXMLCTI CVSS Meta Temp Score Current Exploit Price (≈) CTI Interest Score 8.4 $0-$5k 1.15+ Summaryinfo A vulnerability described as critical has been identified in patrickhener goshs up to 2.0.0-beta.2. Affected by this vulnerability is an unknown functionality of the file httpserver/updown.go. Executing a manipulation can lead to path traversal. This vulnerability is handled as CVE-2026-35392. The attack can be executed remotely. There is not any exploit available. Upgrading the affected component is recommended. Detailsinfo A vulnerability was found in patrickhener goshs up to 2.0.0-beta.2. It has been declared as critical. This vulnerability affects an unknown code block of the file httpserver/updown.go. The manipulation with an unknown input leads to a path traversal vulnerability. The CWE definition for the vulnerability is CWE-22. The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. As an impact it is known to affect confidentiality, integrity, and availability. CVE summarizes: goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, PUT upload in httpserver/updown.go has no path sanitization. This vulnerability is fixed in 2.0.0-beta.3. The advisory is shared for download at github.com. This vulnerability was named CVE-2026-35392 since 04/02/2026. The exploitation appears to be easy. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. There are known technical details, but no exploit is available. The MITRE ATT&CK project declares the attack technique as T1006. Upgrading to version 2.0.0-beta.3 eliminates this vulnerability. Productinfo Vendor patrickhener Name goshs Version 2.0.0-beta.0 2.0.0-beta.1 2.0.0-beta.2 Website Product: https://github.com/patrickhener/goshs/ CPE 2.3info 🔒 🔒 🔒 CPE 2.2info 🔒 🔒 🔒 CVSSv4info VulDB Vector: 🔒 VulDB Reliability: 🔍 CVSSv3info VulDB Meta Base Score: 8.5 VulDB Meta Temp Score: 8.4 VulDB Base Score: 7.3 VulDB Temp Score: 7.0 VulDB Vector: 🔒 VulDB Reliability: 🔍 CNA Base Score: 9.8 CNA Vector (GitHub_M): 🔒 CVSSv2info Vector Complexity Authentication Confidentiality Integrity Availability Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock VulDB Base Score: 🔒 VulDB Temp Score: 🔒 VulDB Reliability: 🔍 Exploitinginfo Class: Path traversal CWE: CWE-22 CAPEC: 🔒 ATT&CK: 🔒 Physical: No Local: No Remote: Yes Availability: 🔒 Status: Not defined Price Prediction: 🔍 Current Price Estimation: 🔒 0-Day Unlock Unlock Unlock Unlock Today Unlock Unlock Unlock Unlock Threat Intelligenceinfo Interest: 🔍 Active Actors: 🔍 Active APT Groups: 🔍 Countermeasuresinfo Recommended: Upgrade Status: 🔍 0-Day Time: 🔒 Upgrade: goshs 2.0.0-beta.3 Timelineinfo 04/02/2026 CVE reserved 04/06/2026 +4 days Advisory disclosed 04/06/2026 +0 days VulDB entry created 04/06/2026 +0 days VulDB entry last update Sourcesinfo Product: github.com Advisory: GHSA-g8mv-vp7j-qp64 Status: Confirmed CVE: CVE-2026-35392 (🔒) GCVE (CVE): GCVE-0-2026-35392 GCVE (VulDB): GCVE-100-355696 Entryinfo Created: 04/06/2026 23:59 Changes: 04/06/2026 23:59 (65) Complete: 🔍 Cache ID: 99:EAC:101 Discussion No comments yet. Languages: en. Please log in to comment. ◂ PreviousOverviewNext ▸
    💬 Team Notes
    Article Info
    Source
    VulDB
    Category
    ⬡ Vulnerabilities & CVEs
    Published
    Apr 07, 2026
    Archived
    Apr 07, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗