<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-34581 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-34581/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 02 Apr 2026 19:21:32 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-34581/feed.xml" rel="self" type="application/rss+xml"/><item><title>goshs Authentication Bypass Vulnerability (CVE-2026-34581)</title><link>https://feed.craftedsignal.io/briefs/2026-04-goshs-auth-bypass/</link><pubDate>Thu, 02 Apr 2026 19:21:32 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-goshs-auth-bypass/</guid><description>goshs versions 1.1.0 to before 2.0.0-beta.2 are vulnerable to authentication bypass via Share Token, potentially allowing code execution (CVE-2026-34581).</description><content:encoded><![CDATA[<p>CVE-2026-34581 affects goshs, a SimpleHTTPServer written in Go. Versions 1.1.0 to before 2.0.0-beta.2 are susceptible to an authentication bypass vulnerability. When a user attempts to access the server with a Share Token, it is possible to bypass the intended file download restriction, gaining access to all goshs functionalities. This includes the ability to execute arbitrary code on the server. The vulnerability was patched in version 2.0.0-beta.2. This vulnerability allows unauthenticated attackers to potentially gain full control of the server hosting goshs. Organizations using affected versions of goshs should upgrade immediately.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a server running a vulnerable version of goshs (1.1.0 to before 2.0.0-beta.2).</li>
<li>Attacker requests a resource that should be protected by the Share Token.</li>
<li>The server prompts for the Share Token.</li>
<li>Attacker exploits the authentication bypass vulnerability by manipulating the request (details not specified in source).</li>
<li>Successful exploitation grants the attacker access to all goshs functionalities, bypassing the intended file download restriction.</li>
<li>Attacker leverages the unrestricted access to execute arbitrary code on the server.</li>
<li>Attacker gains a shell or other form of remote access to the compromised server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-34581 allows an unauthenticated attacker to execute arbitrary code on the server. This can lead to complete system compromise, data theft, or denial of service. The impact is significant for organizations using vulnerable versions of goshs to serve sensitive files or applications. The report does not mention the number of victims, but the severity is high given the potential for code execution.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade goshs to version 2.0.0-beta.2 or later to patch CVE-2026-34581 (reference: <a href="https://github.com/patrickhener/goshs/releases/tag/v2.0.0-beta.2)">https://github.com/patrickhener/goshs/releases/tag/v2.0.0-beta.2)</a>.</li>
<li>Deploy the Sigma rule <code>Detect Goshs Code Execution via Auth Bypass</code> to detect potential exploitation attempts.</li>
<li>Monitor web server logs for suspicious activity related to goshs, specifically requests that might be attempting to bypass authentication.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-34581</category><category>authentication-bypass</category><category>code-execution</category></item></channel></rss>