WordPress LiteSpeed Cache Plugin Security Flaw Exposes Sites to XSS Attacks
Information:
WordPress is the leading website creation tool worldwide, powering over half of the web’s content. This open-source content management system (CMS) is versatile and easy to use, making it an ideal choice for users of all skill levels. LiteSpeed Cache for WordPress (LSCWP) is an all-in-one site acceleration plugin, featuring an exclusive server-level cache and a collection of optimization features.
Container escape is a security risk in which malicious players can leverage a containerized application’s vulnerabilities to breach its isolation boundary, gaining access to the host system’s resources.
Incident :
A new high-severity security flaw has been disclosed in the LiteSpeed Cache plugin for WordPress that could enable malicious actors to execute arbitrary JavaScript code under certain conditions.
The LiteSpeed Cache plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'X-LSCACHE-VARY-VALUE' header in all versions up to, and including, 6.5.0.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This requires the CSS Combine and Generate UCSS settings to be enabled.
Also called persistent XSS attacks, such vulnerabilities make it possible to store an injected script permanently on the target website's servers, such as in a database, in a message forum, in a visitor log, or in a comment.
This causes the malicious code embedded within the script to be executed every time an unsuspecting site visitor lands on the requested resource, for instance, the web page containing the specially crafted comment.
This issue affects LiteSpeed Cache:
Impacted users are recommended to upgrade :
The important things is Security systems. We must concern and monitor as usual.
For more information please contact
Email :sales@inetms.co.th
065 149 2822 (Ms.Suphatson )
063 204 4534 (Ms.Atsamaphorn)
065 929 6330 (Ms.Kansinee)
0613879439 (Ms.Sirilak)
0922576902 (Ms.Narusorn)
References :
Weekly Interesting CVE
NO. |
CVE Name |
Published Date |
Last Update |
Device/Appplication/OS Target |
Attack Type |
CVSS |
Detail |
Solution |
Reference |
---|---|---|---|---|---|---|---|---|---|
1 |
CVE-2024-34331 |
23/9/2024 |
29/9/2024 |
Parallels Desktop Versions 19.3.0 and below. |
Incorrect Execution-Assigned Permissions |
9.8 |
A lack of code signature verification in Parallels Desktop for Mac v19.3.0 and below allows attackers to escalate privileges via a crafted macOS installer, because Parallels Service is setuid root. |
No mitigation known. |
|
2 |
CVE-2024-42505 |
24/9/2024 |
24/9/2024 |
HPE Aruba OS Versions 19.3.0 and below. |
Command injection |
9.8 |
Command injection vulnerabilities in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities results in the ability to execute arbitrary code as a privileged user on the underlying operating system. |
No mitigation known. |
|
3 |
CVE-2024-7018 |
23/9/2024 |
26/9/2024 |
Google Chrome prior to 124.0.6367.78 |
Heap buffer overflow |
8.8 |
Heap buffer overflow in PDF in Google Chrome prior to 124.0.6367.78 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium) |
Upgrade chromium to version 124.0.6367.78 or higher. |
|
4 |
CVE-2024-6769 |
26/9/2024 |
30/9/2024 |
Microsoft Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, and Windows Server 2022 |
DLL Hijacking |
8.4 |
A DLL Hijacking caused by drive remapping combined with a poisoning of the activation cache allows a malicious authenticated attacker to elevate from a medium integrity process to a high integrity process without the intervention of a UAC prompt. |
No mitigation known. |
https://www.globalsecuritymag.fr/microsoft-vulnerability-cve-2024-6769-now-public-on-fortra-com.html |
5 |
CVE-2024-7479 |
09/25/2024 |
09/26/2024 |
TeamViewer Remote Clients prior version 15.58.4 for Windows |
Previlege Escalation |
8.8 |
Improper verification of cryptographic signature during installation of a VPN driver via the TeamViewer_service.exe component of TeamViewer Remote Clients prior version 15.58.4 for Windows allows an attacker with local unprivileged access on a Windows system to elevate their privileges and install drivers. |
Update to the latest version (15.58.4 or the latest version available) |
https://www.teamviewer.com/th/resources/trust-center/security-bulletins/tv-2024-1006/? |
Malware News or Campaign IOC/IOA | EN
No |
Campaign Name |
Detection Date |
Attack Type |
Description |
Mitigation/Remediation |
---|---|---|---|---|---|
1 |
New Cryptojacking Attack Targets Docker API to Create Malicious Swarm Botnet |
01/10/2024 |
Cryptojacking, Botnet |
Attackers are exploiting vulnerable, exposed Docker API endpoints to create botnets using Docker Swarm's orchestration features. The attack initiates by scanning the internet for exposed Docker API endpoints using tools like masscan and ZGrab. After gaining access, the attackers deploy an Alpine container that runs a malicious script (init.sh) to install a cryptocurrency miner (XMRig) and laterally spread across Docker, Kubernetes, and SSH systems. The malware propagates by exploiting ports associated with Docker services and compromising SSH keys and other credentials. The attack aims to hide the miner using a rootkit and maintain persistence through backdoors, creating a decentralized botnet |
|
Ref: https://thehackernews.com/2024/10/new-cryptojacking-attack-targets-docker.html
11 October 2024
Viewed 116 time