RSFirewall tries to identify the original IP address by looking at different HTTP headers. A bypass is possible due to the way it is implemented.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/c0ed80c8-ebbf-4ed9-b02f-31660097c352 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/c0ed80c8-ebbf-4ed9-b02f-31660097c352 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:37
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/c0ed80c8-ebbf-4ed9-b02f-31660097c352 - Exploit, Third Party Advisory |
07 Nov 2023, 03:40
Type | Values Removed | Values Added |
---|---|---|
CWE |
Information
Published : 2022-12-15 19:15
Updated : 2024-11-21 06:37
NVD link : CVE-2021-4226
Mitre link : CVE-2021-4226
CVE.ORG link : CVE-2021-4226
JSON object : View
Products Affected
rsjoomla
- rsfirewall\!
CWE
No CWE.