| |
Vulnerability CVE-2021-24964
Published: 2022-01-03
Description: |
The LiteSpeed Cache WordPress plugin before 4.4.4 does not properly verify that requests are coming from QUIC.cloud servers, allowing attackers to make requests to certain endpoints by using a specific X-Forwarded-For header value. In addition, one of the endpoint could be used to set CSS code if a setting is enabled, which will then be output in some pages without being sanitised and escaped. Combining those two issues, an unauthenticated attacker could put Cross-Site Scripting payloads in pages visited by users. |
Type:
CWE-79 (Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'))
CVSS2 => (AV:N/AC:H/Au:N/C:N/I:P/A:N)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
2.6/10 |
2.9/10 |
4.9/10 |
Exploit range |
Attack complexity |
Authentication |
Remote |
High |
No required |
Confidentiality impact |
Integrity impact |
Availability impact |
None |
Partial |
None |
References: |
https://wpscan.com/vulnerability/e9966b3e-2eb9-4d70-8c18-6a829b4827cc
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|