Though this assault requires that the crawler has been enabled (it’s disabled by default) and used at the very least as soon as to generate a hash, the researchers additional found than an unprotected Ajax handler might be known as to set off hash era. “This implies all websites utilizing LiteSpeed Cache — not simply these with its crawler characteristic enabled — are weak,” the report mentioned.
Home windows techniques not affected
Home windows techniques are resistant to the vulnerability, the report continued, as a result of a operate required to generate the hash is just not accessible in Home windows, which, it mentioned, “means the hash can’t be generated on Home windows-based WordPress cases, making the vulnerability exploitable on different [operating systems] reminiscent of Linux environments.”
LiteSpeed “strongly recommends” that customers improve to model 6.4 or larger of the plugin instantly, and in addition verify their websites’ person lists for any unrecognized accounts with administrator privileges and delete them. If an improve isn’t instantly attainable, it supplied some short-term measures to mitigate the chance in its weblog submit describing the difficulty.