We found results for “”
CVE-2024-41432
Good to know:
Date: August 6, 2024
An IP Spoofing vulnerability has been discovered in Likeshop up to 2.5.7.20210811. This issue allows an attacker to replace their real IP address with any arbitrary IP address, specifically by adding a forged 'X-Forwarded' or 'Client-IP' header to requests. Exploiting IP spoofing, attackers can bypass account lockout mechanisms during attempts to log into admin accounts, spoof IP addresses in requests sent to the server, and impersonate IP addresses that have logged into user accounts, etc.
Language: PHP
Severity Score
Severity Score
Weakness Type (CWE)
Authentication Bypass by Spoofing
CWE-290Top Fix
Upgrade Version
Upgrade to version zhangsong9008/thinkadmin - v6.x-dev;topthink/framework - v5.1.41;liwy/ganglonggou-api - dev-zhl;shopxo/shopxo - v1.1.0;shopxo/shopxo - v2.0.3;shopxo/shopxo - 2.1.0;orchief/think51 - 1.0.9;zoujingli/thinkadmin - v6.x-dev;zoujingli/thinkadmin - v4.0.0;oss_think/framework - v5.1.41;thinkcmf/thinkcmf - v5.1.7;oyswonder/thinkcmf - no_fix;nandiao/thinkphp - v5.1.41;twelvet/twelvet - v1.0.1;lanrucn/lanruadmin - no_fix;better-framework/thinkphp - v5.1.41;ayflying/bbcms - 0.9.9.x-dev
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | NONE |
| Integrity (I): | LOW |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


