Skip to main content

CVE-2022-0072: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in LiteSpeed Technologies OpenLiteSpeed Web Server

Medium
VulnerabilityCVE-2022-0072cvecve-2022-0072cwe-22
Published: Thu Oct 27 2022 (10/27/2022, 19:28:49 UTC)
Source: CVE
Vendor/Project: LiteSpeed Technologies
Product: OpenLiteSpeed Web Server

Description

Directory Traversal vulnerability in LiteSpeed Technologies OpenLiteSpeed Web Server and LiteSpeed Web Server dashboards allows Path Traversal. This affects versions from 1.5.11 through 1.5.12, from 1.6.5 through 1.6.20.1, from 1.7.0 before 1.7.16.1

AI-Powered Analysis

AILast updated: 07/04/2025, 23:57:06 UTC

Technical Analysis

CVE-2022-0072 is a directory traversal vulnerability (CWE-22) affecting LiteSpeed Technologies' OpenLiteSpeed Web Server and LiteSpeed Web Server dashboards. The flaw exists in versions 1.5.11 through 1.5.12, 1.6.5 through 1.6.20.1, and 1.7.0 before 1.7.16.1. This vulnerability allows an unauthenticated remote attacker to manipulate pathname inputs to access files and directories outside the intended restricted directory. The vulnerability arises from improper limitation of pathname traversal sequences, such as '../', enabling attackers to read arbitrary files on the server. The CVSS v3.1 base score is 5.8 (medium severity), with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), scope changed (S:C), confidentiality impact low (C:L), and no impact on integrity or availability (I:N/A:N). Exploitation does not require authentication or user interaction, increasing the risk of automated attacks. Although no known exploits are reported in the wild, the vulnerability could be leveraged to access sensitive configuration files, credentials, or other data that could facilitate further compromise. The scope change indicates that the vulnerability affects resources beyond the initially vulnerable component, potentially impacting the entire server environment. The lack of patches linked in the provided data suggests that users should verify the availability of vendor updates and apply them promptly to remediate the issue.

Potential Impact

For European organizations using OpenLiteSpeed Web Server, this vulnerability poses a risk of unauthorized disclosure of sensitive information stored on web servers. Attackers exploiting this flaw could access configuration files, source code, or other sensitive data, potentially leading to further attacks such as credential theft, privilege escalation, or lateral movement within networks. Given that OpenLiteSpeed is used in various hosting environments, including small to medium enterprises and web hosting providers, the impact could extend to customer data confidentiality and service trustworthiness. The medium severity score reflects a moderate risk; however, the lack of required privileges and user interaction increases the likelihood of exploitation. Organizations handling personal data under GDPR must consider the potential for data breaches and the associated regulatory and reputational consequences. Additionally, compromised web servers can be leveraged as footholds for broader attacks against internal networks or supply chains, amplifying the threat to European entities.

Mitigation Recommendations

European organizations should immediately identify all instances of OpenLiteSpeed Web Server in their environments and verify the version in use. Applying the latest vendor patches or updates that address CVE-2022-0072 is the primary mitigation step. If patches are not yet available, organizations should implement strict access controls to limit exposure of the web server dashboards and restrict access to trusted IP addresses only. Web application firewalls (WAFs) should be configured to detect and block directory traversal patterns in HTTP requests. Regularly auditing server logs for suspicious path traversal attempts can help in early detection of exploitation attempts. Additionally, organizations should ensure that sensitive files and directories are not accessible by the web server user and that file system permissions follow the principle of least privilege. Network segmentation can limit the impact of a compromised web server. Finally, organizations should monitor threat intelligence sources for any emerging exploit code or attack campaigns related to this vulnerability to adjust defenses accordingly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
palo_alto
Date Reserved
2021-12-28T23:57:03.295Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd7442

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 7/4/2025, 11:57:06 PM

Last updated: 8/14/2025, 3:45:44 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats