Files
CVEs-PoC/2021/CVE-2021-24964.md
T
2024-06-18 02:51:15 +02:00

18 lines
1.1 KiB
Markdown

### [CVE-2021-24964](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24964)
![](https://img.shields.io/static/v1?label=Product&message=LiteSpeed%20Cache&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=4.4.4%3C%204.4.4%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-site%20Scripting%20(XSS)&color=brighgreen)
### Description
The LiteSpeed Cache WordPress plugin before 4.4.4 does not properly verify that requests are coming from QUIC.cloud servers, allowing attackers to make requests to certain endpoints by using a specific X-Forwarded-For header value. In addition, one of the endpoint could be used to set CSS code if a setting is enabled, which will then be output in some pages without being sanitised and escaped. Combining those two issues, an unauthenticated attacker could put Cross-Site Scripting payloads in pages visited by users.
### POC
#### Reference
- https://wpscan.com/vulnerability/e9966b3e-2eb9-4d70-8c18-6a829b4827cc
#### Github
No PoCs found on GitHub currently.