Thursday, March 30, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > LiteSpeed Web Server has high-severity vulnerabilities

LiteSpeed Web Server has high-severity vulnerabilities

Researchers of Unit 42 have discovered high and medium-severity vulnerabilities on LiteSpeed Web Server.


Rusen Gobel Rusen Gobel
November 14, 2022
2 min read
  • Unit 42, the security research team of Palo Alto Networks, has found three vulnerabilities on LiteSpeed Web Server.
  • The vulnerabilities that two of them are high-severity ones, affect both the enterprise and the open-source versions of LiteSpeed.
  • LiteSpeed Technologies has patched both versions of its software approximately two weeks after they have been noticed by Palo Alto Networks.

Palo Alto Networks’ Unit 42 has published a report for their research on LiteSpeed Web Server. The team has found three vulnerabilities that affect both open-source and enterprise versions of the web server software maintained by LiteSpeed Technologies.

Two high-severity vulnerabilities

The first vulnerability, which can be tracked with CVE-2022-0073, has a CVSS score of 8.8, making it a high-severity vulnerability. This vulnerability exists in the External App Command field of the LiteSpeed Web Server admin dashboard, allowing the attackers with access to the dashboard to execute code on the server.

The second vulnerability with CVE ID of CVE-2022-0074, which also has a CVSS score of 8.8 allows attackers to escalate the privileges. According to the report, this vulnerability is caused by a misconfiguration in the PATH environment variable. The researchers of Unit 42 have managed to execute code as an unprivileged user to place a malicious file in /usr/local/bin later to execute it with a highly privileged process such as entrypoint.sh, which runs as root. By doing this, the team has managed to escalate the privileges of the unprivileged user.

The third vulnerability, which can be tracked with CVE-2022-0072, has a lower CVSS score than the other two; 5.8. It is a directory traversal vulnerability that allows attackers to bypass security measures and access the files.

« When browsing in LiteSpeed, the server will make sure that clients only access endpoints that should be visible to them. It does so by verifying that the requested URL does not contain characters that will result in a directory traversal and thus allow them to access forbidden endpoints.

This verification is done by two regular expressions, on lines 2060 and 2061. We managed to bypass those regular expression verifications, and we were able to access paths that we were not able to access initially. »

Fixed with patches

Palo Alto Networks researchers found those vulnerabilities more than a month ago, and LiteSpeed released a patch approximately two weeks after that. The 1.7.16.1 version for OpenLiteSpeed and the 6.0.12 version for LiteSpeed Web Server fix vulnerabilities.

LiteSpeed Technologies states that there might be a delay between the announcement and the auto-update in LiteSpeed Web Server; so users can manually update their instances by using the command below:

/usr/local/lsws/admin/misc/lsup.sh -f -v 6.0.12

See more Cybersecurity News

A comprehensive guide to understanding Cybersecurity: What is Cybersecurity?


Tags: LiteSpeedPalo Alto Networks
Rusen Gobel

Rusen Gobel

Rusen Gobel is the managing editor of Cloud7. With more than 10 years of experience, Rusen worked as a hardware and software news editor for technology sites such as ShiftDelete, Teknokulis, Hardware Plus, BT Haber. In addition, Rusen publishes consumer product reviews on his YouTube channel. While consumer electronics has been his main focus for years, now Rusen is more interested in WordPress and software development. He had contributed different web application projects in his professional career. Rusen had graduated from Istanbul University, department of Computer Engineering. Rusen has a very high passion for learning and writing for every kind of technology. That's why he has been working as a tech editor for more than ten years on several different technology magazines and online news portals.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
New VMware Anywhere Workspace update introduces new features

New VMware Anywhere Workspace update introduces new features

Related News

7 best practices and tools to use for Linux security

7 best practices and tools to use for Linux security

March 24, 2023 5:00 pm
CISA aims to identify vulnerabilities that attract ransomware

CISA aims to identify vulnerabilities that attract ransomware

March 22, 2023 2:10 pm
7 best cybersecurity schools

7 best cybersecurity schools

March 21, 2023 9:00 pm
Akamai researchers warn about the new HinataBot botnet

Akamai researchers warn about the new HinataBot botnet

March 20, 2023 6:10 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Recent News

  • [Event] Grab your DeveloperWeek Europe 2023 ticket free
  • How to get Linux ready for gaming
  • Trisquel GNU/Linux 11.0 review
  • What is continuous testing in DevOps?
  • [Event] FOSSASIA Summit 2023 – Get your discounted ticket now

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • Artificial Intelligence
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About Us
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.