6.5
CVE-2018-19791
- EPSS 0.29%
- Published 03.12.2018 06:29:00
- Last modified 21.11.2024 03:58:33
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
The server in LiteSpeed OpenLiteSpeed before 1.5.0 RC6 does not correctly handle requests for byte sequences, allowing an attacker to amplify the response size by requesting the entire response body repeatedly, as demonstrated by an HTTP Range header value beginning with the "bytes=0-,0-" substring.
Data is provided by the National Vulnerability Database (NVD)
Litespeedtech ≫ Openlitespeed Version < 1.5.0
Litespeedtech ≫ Openlitespeed Version1.5.0 Update-
Litespeedtech ≫ Openlitespeed Version1.5.0 Updaterc1
Litespeedtech ≫ Openlitespeed Version1.5.0 Updaterc2
Litespeedtech ≫ Openlitespeed Version1.5.0 Updaterc3
Litespeedtech ≫ Openlitespeed Version1.5.0 Updaterc4
Litespeedtech ≫ Openlitespeed Version1.5.0 Updaterc5
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.29% | 0.496 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 6.5 | 2.8 | 3.6 |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|
nvd@nist.gov | 4 | 8 | 2.9 |
AV:N/AC:L/Au:S/C:N/I:N/A:P
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.