Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2018-19791


The server in LiteSpeed OpenLiteSpeed before 1.5.0 RC6 does not correctly handle requests for byte sequences, allowing an attacker to amplify the response size by requesting the entire response body repeatedly, as demonstrated by an HTTP Range header value beginning with the "bytes=0-,0-" substring.


Published

2018-12-03T06:29:00.400

Last Modified

2024-11-21T03:58:33.977

Status

Modified

Source

[email protected]

Severity

CVSSv3.0: 6.5 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:S/C:N/I:N/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: PARTIAL
Exploitability Score

8.0

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-20

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application litespeedtech openlitespeed < 1.5.0 Yes
Application litespeedtech openlitespeed 1.5.0 Yes
Application litespeedtech openlitespeed 1.5.0 Yes
Application litespeedtech openlitespeed 1.5.0 Yes
Application litespeedtech openlitespeed 1.5.0 Yes
Application litespeedtech openlitespeed 1.5.0 Yes
Application litespeedtech openlitespeed 1.5.0 Yes

References