Though this assault requires that the crawler has been enabled (it’s disabled by default) and used not less than as soon as to generate a hash, the researchers additional found than an unprotected Ajax handler might be referred to as to set off hash technology. “This implies all websites utilizing LiteSpeed Cache — not simply these with its crawler characteristic enabled — are weak,” the report mentioned.
Home windows programs not affected
Home windows programs are resistant to the vulnerability, the report continued, as a result of a operate required to generate the hash shouldn’t be obtainable in Home windows, which, it mentioned, “means the hash can’t be generated on Home windows-based WordPress situations, making the vulnerability exploitable on different [operating systems] comparable to Linux environments.”
LiteSpeed “strongly recommends” that customers improve to model 6.4 or greater of the plugin instantly, and in addition examine their websites’ person lists for any unrecognized accounts with administrator privileges and delete them. If an improve isn’t instantly potential, it supplied some non permanent measures to mitigate the danger in its weblog put up describing the difficulty.