CVE-2021-4226

RSFirewall tries to identify the original IP address by looking at different HTTP headers. A bypass is possible due to the way it is implemented.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:rsjoomla:rsfirewall\!:*:*:*:*:*:wordpress:*:*

History

20 Dec 2022, 16:19

Type Values Removed Values Added
References (MISC) https://wpscan.com/vulnerability/c0ed80c8-ebbf-4ed9-b02f-31660097c352 - (MISC) https://wpscan.com/vulnerability/c0ed80c8-ebbf-4ed9-b02f-31660097c352 - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:rsjoomla:rsfirewall\!:*:*:*:*:*:wordpress:*:*

15 Dec 2022, 19:56

Type Values Removed Values Added
New CVE

Information

Published : 2022-12-15 19:15

Updated : 2024-02-04 23:14


NVD link : CVE-2021-4226

Mitre link : CVE-2021-4226

CVE.ORG link : CVE-2021-4226


JSON object : View

Products Affected

rsjoomla

  • rsfirewall\!
CWE

No CWE.