An IP Spoofing vulnerability has been discovered in Likeshop up to 2.5.7.20210811. This issue allows an attacker to replace their real IP address with any arbitrary IP address, specifically by adding a forged 'X-Forwarded' or 'Client-IP' header to requests. Exploiting IP spoofing, attackers can bypass account lockout mechanisms during attempts to log into admin accounts, spoof IP addresses in requests sent to the server, and impersonate IP addresses that have logged into user accounts, etc.
References
Link | Resource |
---|---|
https://gitlab.com/c2at3/cve-2024-41432/-/blob/main/README.md | Exploit |
Configurations
History
08 Aug 2024, 15:02
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://gitlab.com/c2at3/cve-2024-41432/-/blob/main/README.md - Exploit | |
First Time |
Likeshop likeshop
Likeshop |
|
CPE | cpe:2.3:a:likeshop:likeshop:*:*:*:*:*:*:*:* |
07 Aug 2024, 18:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
CWE | CWE-290 |
07 Aug 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-07 16:15
Updated : 2024-08-08 15:02
NVD link : CVE-2024-41432
Mitre link : CVE-2024-41432
CVE.ORG link : CVE-2024-41432
JSON object : View
Products Affected
likeshop
- likeshop
CWE
CWE-290
Authentication Bypass by Spoofing