Join GitHub today
GitHub is home to over 31 million developers working together to host and review code, manage projects, and build software together.
Sign upVulnerabilities in Openlitespeed web server #117
Comments
This comment has been minimized.
This comment has been minimized.
We will fix these issues soon. |
This comment has been minimized.
This comment has been minimized.
It was fixed and will be in the next release. |
litespeedtech
closed this
Nov 28, 2018
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
wireghoul commentedNov 28, 2018
These are vulnerabilities that were discoverd during the "Auditing source code for vulnerabilities" workshop at Hack In The Box Dubai 2018.
Denial of Service
The openlitespeed server does not correctly handle requests for byte sequences allowing an attacker to amplify the response size by requesting the entire response body repeatedly. The following curl request illustrates this issue:
Multiple buffer overflow
There are a number of buffer overflows in the web server source code. While many require administrative access to alter configuration to trigger, the following example can be triggered by a local user:
The following proof of concept is offered to illustrate the buffer overflow: