Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   


Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker

Category:   Application (Web Server/CGI)  >   LiteSpeed Web Server Vendors:   Lite Speed Technologies Inc.
LiteSpeed Web Server Input Validation Flaw Lets Remote Users Inject HTTP Headers
SecurityTracker Alert ID:  1034746
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Jan 20 2016
Impact:   Modification of system information, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 5.1.0; possibly earlier versions
Description:   A vulnerability was reported in LiteSpeed Web Server. A remote user can inject arbitrary HTTP headers.

A remote user can supply a specially crafted HTTP request to inject arbitrary HTTP headers.

A demonstration exploit command is provided:


The vendor was notified on January 15, 2016.

Ziyahan Albeniz (using the Netsparker Web Application Security Scanner) reported this vulnerability.

Impact:   A remote user can inject arbitrary HTTP headers to set cookies or conduct cross-site scripting attacks.
Solution:   The vendor has issued a fix (5.0.11, 5.1.1).

The vendor's advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Input validation error

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

Copyright 2016, LLC