Vulnerabilites related to liferay - digital_experience_platform
cve-2024-25606
Vulnerability from cvelistv5
Published
2024-02-20 09:03
Modified
2024-08-01 23:44
Summary
XXE vulnerability in Liferay Portal 7.2.0 through 7.4.3.7, and older unsupported versions, and Liferay DXP 7.4 before update 4, 7.3 before update 12, 7.2 before fix pack 20, and older unsupported versions allows attackers with permission to deploy widgets/portlets/extensions to obtain sensitive information or consume system resources via the Java2WsddTask._format method.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.2.0
Create a notification for this product.
   Liferay DXP Version: 7.4.13
Version: 7.3.10
Version: 7.2.10
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-25606",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-20T13:32:40.505546Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-05T17:20:56.428Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T23:44:09.795Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25606"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.7",
              "status": "affected",
              "version": "7.2.0",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.13.u3",
              "status": "affected",
              "version": "7.4.13",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.3.10.u11",
              "status": "affected",
              "version": "7.3.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.2.10-dxp-19",
              "status": "affected",
              "version": "7.2.10",
              "versionType": "maven"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "XXE vulnerability in Liferay Portal 7.2.0 through 7.4.3.7, and older unsupported versions, and Liferay DXP 7.4 before update 4, 7.3 before update 12, 7.2 before fix pack 20, and older unsupported versions allows attackers with permission to deploy widgets/portlets/extensions to obtain sensitive information or consume system resources via the Java2WsddTask._format method."
            }
          ],
          "value": "XXE vulnerability in Liferay Portal 7.2.0 through 7.4.3.7, and older unsupported versions, and Liferay DXP 7.4 before update 4, 7.3 before update 12, 7.2 before fix pack 20, and older unsupported versions allows attackers with permission to deploy widgets/portlets/extensions to obtain sensitive information or consume system resources via the Java2WsddTask._format method."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-611",
              "description": "CWE-611 Improper Restriction of XML External Entity Reference",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-20T09:03:19.221Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25606"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2024-25606",
    "datePublished": "2024-02-20T09:03:19.221Z",
    "dateReserved": "2024-02-08T13:57:11.425Z",
    "dateUpdated": "2024-08-01T23:44:09.795Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-26267
Vulnerability from cvelistv5
Published
2024-02-20 13:01
Modified
2024-08-02 00:07
Summary
In Liferay Portal 7.2.0 through 7.4.3.25, and older unsupported versions, and Liferay DXP 7.4 before update 26, 7.3 before update 5, 7.2 before fix pack 19, and older unsupported versions the default value of the portal property `http.header.version.verbosity` is set to `full`, which allows remote attackers to easily identify the version of the application that is running and the vulnerabilities that affect that version via 'Liferay-Portal` response header.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.2.0
Create a notification for this product.
   Liferay DXP Version: 7.4.13
Version: 7.3.10
Version: 7.2.10
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-26267",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-21T15:20:52.766968Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:49:00.661Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T00:07:17.897Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-26267"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.25",
              "status": "affected",
              "version": "7.2.0",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.13.u25",
              "status": "affected",
              "version": "7.4.13",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.3.10.u4",
              "status": "affected",
              "version": "7.3.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.2.10-dxp-18",
              "status": "affected",
              "version": "7.2.10",
              "versionType": "maven"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "In Liferay Portal 7.2.0 through 7.4.3.25, and older unsupported versions, and Liferay DXP 7.4 before update 26, 7.3 before update 5, 7.2 before fix pack 19, and older unsupported versions the default value of the portal property `http.header.version.verbosity` is set to `full`, which allows remote attackers to easily identify the version of the application that is running and the vulnerabilities that affect that version via \u0027Liferay-Portal` response header."
            }
          ],
          "value": "In Liferay Portal 7.2.0 through 7.4.3.25, and older unsupported versions, and Liferay DXP 7.4 before update 26, 7.3 before update 5, 7.2 before fix pack 19, and older unsupported versions the default value of the portal property `http.header.version.verbosity` is set to `full`, which allows remote attackers to easily identify the version of the application that is running and the vulnerabilities that affect that version via \u0027Liferay-Portal` response header."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1188",
              "description": "CWE-1188 Insecure Default Initialization of Resource",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-20T13:02:05.832Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-26267"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2024-26267",
    "datePublished": "2024-02-20T13:01:23.251Z",
    "dateReserved": "2024-02-15T07:44:36.776Z",
    "dateUpdated": "2024-08-02T00:07:17.897Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-25604
Vulnerability from cvelistv5
Published
2024-02-20 08:40
Modified
2024-08-01 23:44
Summary
Liferay Portal 7.2.0 through 7.4.3.4, and older unsupported versions, and Liferay DXP 7.4.13, 7.3 before service pack 3, 7.2 before fix pack 17, and older unsupported versions does not properly check user permissions, which allows remote authenticated users with the VIEW user permission to edit their own permission via the User and Organizations section of the Control Panel.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.2.0
Create a notification for this product.
   Liferay DXP Version: 7.4.13
Version: 7.3.10
Version: 7.2.10
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-25604",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-21T18:38:45.740772Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:35:25.137Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T23:44:09.655Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25604"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.4",
              "status": "affected",
              "version": "7.2.0",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "status": "affected",
              "version": "7.4.13"
            },
            {
              "lessThanOrEqual": "7.3.10-dxp-2",
              "status": "affected",
              "version": "7.3.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.2.10-dxp-16",
              "status": "affected",
              "version": "7.2.10",
              "versionType": "maven"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Liferay Portal 7.2.0 through 7.4.3.4, and older unsupported versions, and Liferay DXP 7.4.13, 7.3 before service pack 3, 7.2 before fix pack 17, and older unsupported versions does not properly check user permissions, which allows remote authenticated users with the VIEW user permission to edit their own permission via the User and Organizations section of the Control Panel."
            }
          ],
          "value": "Liferay Portal 7.2.0 through 7.4.3.4, and older unsupported versions, and Liferay DXP 7.4.13, 7.3 before service pack 3, 7.2 before fix pack 17, and older unsupported versions does not properly check user permissions, which allows remote authenticated users with the VIEW user permission to edit their own permission via the User and Organizations section of the Control Panel."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-863",
              "description": "CWE-863 Incorrect Authorization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-20T08:40:59.252Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25604"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2024-25604",
    "datePublished": "2024-02-20T08:40:59.252Z",
    "dateReserved": "2024-02-08T13:57:11.425Z",
    "dateUpdated": "2024-08-01T23:44:09.655Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-33950
Vulnerability from cvelistv5
Published
2023-05-24 16:10
Modified
2024-10-22 15:51
Summary
Pattern Redirects in Liferay Portal 7.4.3.48 through 7.4.3.76, and Liferay DXP 7.4 update 48 through 76 allows regular expressions that are vulnerable to ReDoS attacks to be used as patterns, which allows remote attackers to consume an excessive amount of server resources via crafted request URLs.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.4.3.48
Create a notification for this product.
   Liferay DXP Version: 7.4.13.u48
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:54:13.911Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33950"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-33950",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-22T15:43:43.861695Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-22T15:51:22.703Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.76",
              "status": "affected",
              "version": "7.4.3.48",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.13.u76",
              "status": "affected",
              "version": "7.4.13.u48",
              "versionType": "maven"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Pattern Redirects in Liferay Portal 7.4.3.48 through 7.4.3.76, and Liferay DXP 7.4 update 48 through 76 allows regular expressions that are vulnerable to ReDoS attacks to be used as patterns, which allows remote attackers to consume an excessive amount of server resources via crafted request URLs."
            }
          ],
          "value": "Pattern Redirects in Liferay Portal 7.4.3.48 through 7.4.3.76, and Liferay DXP 7.4 update 48 through 76 allows regular expressions that are vulnerable to ReDoS attacks to be used as patterns, which allows remote attackers to consume an excessive amount of server resources via crafted request URLs."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1333",
              "description": "CWE-1333 Inefficient Regular Expression Complexity",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-24T16:10:10.701Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33950"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2023-33950",
    "datePublished": "2023-05-24T16:10:10.701Z",
    "dateReserved": "2023-05-24T02:36:00.165Z",
    "dateUpdated": "2024-10-22T15:51:22.703Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-42498
Vulnerability from cvelistv5
Published
2024-02-21 02:47
Modified
2024-08-02 19:23
Severity ?
Summary
Reflected cross-site scripting (XSS) vulnerability in the Language Override edit screen in Liferay Portal 7.4.3.8 through 7.4.3.97, and Liferay DXP 2023.Q3 before patch 5, and 7.4 update 4 through 92 allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_portal_language_override_web_internal_portlet_PLOPortlet_key parameter.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.4.3.8
Create a notification for this product.
   Liferay DXP Version: 2023.q3.1
Version: 7.4.13.u4
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-42498",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-26T17:54:30.386431Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:25:12.034Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T19:23:39.621Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-42498"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.97",
              "status": "affected",
              "version": "7.4.3.8",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "2023.q3.4",
              "status": "affected",
              "version": "2023.q3.1",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.4.13.u92",
              "status": "affected",
              "version": "7.4.13.u4",
              "versionType": "maven"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Amin ACHOUR"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Reflected cross-site scripting (XSS) vulnerability in the Language Override edit screen in Liferay Portal 7.4.3.8 through 7.4.3.97, and Liferay DXP 2023.Q3 before patch 5, and 7.4 update 4 through 92 allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_portal_language_override_web_internal_portlet_PLOPortlet_key parameter."
            }
          ],
          "value": "Reflected cross-site scripting (XSS) vulnerability in the Language Override edit screen in Liferay Portal 7.4.3.8 through 7.4.3.97, and Liferay DXP 2023.Q3 before patch 5, and 7.4 update 4 through 92 allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_portal_language_override_web_internal_portlet_PLOPortlet_key parameter."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.6,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-21T02:47:45.261Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-42498"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2023-42498",
    "datePublished": "2024-02-21T02:47:45.261Z",
    "dateReserved": "2023-09-11T08:54:24.312Z",
    "dateUpdated": "2024-08-02T19:23:39.621Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-33947
Vulnerability from cvelistv5
Published
2023-05-24 15:34
Modified
2024-10-22 15:51
Summary
The Object module in Liferay Portal 7.4.3.4 through 7.4.3.60, and Liferay DXP 7.4 before update 61 does not segment object definition by virtual instance in search which allows remote authenticated users in one virtual instance to view object definition from a second virtual instance by searching for the object definition.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:54:13.639Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33947"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-33947",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-22T15:44:18.454627Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-22T15:51:45.231Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.60",
              "status": "affected",
              "version": "7.4.3.4",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.13.u60",
              "status": "affected",
              "version": "7.4.13",
              "versionType": "maven"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The Object module in Liferay Portal 7.4.3.4 through 7.4.3.60, and Liferay DXP 7.4 before update 61 does not segment object definition by virtual instance in search which allows remote authenticated users in one virtual instance to view object definition from a second virtual instance by searching for the object definition."
            }
          ],
          "value": "The Object module in Liferay Portal 7.4.3.4 through 7.4.3.60, and Liferay DXP 7.4 before update 61 does not segment object definition by virtual instance in search which allows remote authenticated users in one virtual instance to view object definition from a second virtual instance by searching for the object definition."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 2.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-284",
              "description": "CWE-284 Improper Access Control",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-24T15:34:37.132Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33947"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2023-33947",
    "datePublished": "2023-05-24T15:34:37.132Z",
    "dateReserved": "2023-05-24T02:36:00.165Z",
    "dateUpdated": "2024-10-22T15:51:45.231Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-42627
Vulnerability from cvelistv5
Published
2023-10-17 12:08
Modified
2024-08-02 19:23
Severity ?
Summary
Multiple stored cross-site scripting (XSS) vulnerabilities in the Commerce module in Liferay Portal 7.3.5 through 7.4.3.91, and Liferay DXP 7.3 update 33 and earlier, and 7.4 before update 92 allow remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a (1) Shipping Name, (2) Shipping Phone Number, (3) Shipping Address, (4) Shipping Address 2, (5) Shipping Address 3, (6) Shipping Zip, (7) Shipping City, (8) Shipping Region (9), Shipping Country, (10) Billing Name, (11) Billing Phone Number, (12) Billing Address, (13) Billing Address 2, (14) Billing Address 3, (15) Billing Zip, (16) Billing City, (17) Billing Region, (18) Billing Country, or (19) Region Code.
Impacted products
Vendor Product Version
Liferay DXP Version: 7.3.10
Version: 7.4.13
Create a notification for this product.
   Liferay Portal Version: 7.3.5
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T19:23:39.907Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-42627"
          },
          {
            "tags": [
              "third-party-advisory",
              "exploit",
              "x_transferred"
            ],
            "url": "https://www.pentagrid.ch/en/blog/stored-cross-site-scripting-vulnerabilities-in-liferay-portal/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.3.10.*",
              "status": "affected",
              "version": "7.3.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.4.13.u91",
              "status": "affected",
              "version": "7.4.13",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.91",
              "status": "affected",
              "version": "7.3.5",
              "versionType": "maven"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Michael Oelke"
        }
      ],
      "datePublic": "2023-10-17T12:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Multiple stored cross-site scripting (XSS) vulnerabilities in the Commerce module in Liferay Portal 7.3.5 through 7.4.3.91, and Liferay DXP 7.3 update 33 and earlier, and 7.4 before update 92 allow remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a (1) Shipping Name, (2) Shipping Phone Number, (3) Shipping Address, (4) Shipping Address 2, (5) Shipping Address 3, (6) Shipping Zip, (7) Shipping City, (8) Shipping Region (9), Shipping Country, (10) Billing Name, (11) Billing Phone Number, (12) Billing Address, (13) Billing Address 2, (14) Billing Address 3, (15) Billing Zip, (16) Billing City, (17) Billing Region, (18) Billing Country, or (19) Region Code."
            }
          ],
          "value": "Multiple stored cross-site scripting (XSS) vulnerabilities in the Commerce module in Liferay Portal 7.3.5 through 7.4.3.91, and Liferay DXP 7.3 update 33 and earlier, and 7.4 before update 92 allow remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a (1) Shipping Name, (2) Shipping Phone Number, (3) Shipping Address, (4) Shipping Address 2, (5) Shipping Address 3, (6) Shipping Zip, (7) Shipping City, (8) Shipping Region (9), Shipping Country, (10) Billing Name, (11) Billing Phone Number, (12) Billing Address, (13) Billing Address 2, (14) Billing Address 3, (15) Billing Zip, (16) Billing City, (17) Billing Region, (18) Billing Country, or (19) Region Code."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.6,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-10T02:28:51.923Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-42627"
        },
        {
          "tags": [
            "third-party-advisory",
            "exploit"
          ],
          "url": "https://www.pentagrid.ch/en/blog/stored-cross-site-scripting-vulnerabilities-in-liferay-portal/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2023-42627",
    "datePublished": "2023-10-17T12:08:22.684Z",
    "dateReserved": "2023-09-12T05:35:42.826Z",
    "dateUpdated": "2024-08-02T19:23:39.907Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-45320
Vulnerability from cvelistv5
Published
2024-02-20 00:00
Modified
2024-08-03 14:09
Severity ?
Summary
Liferay Portal before 7.4.3.16 and Liferay DXP before 7.2 fix pack 19, 7.3 before update 6, and 7.4 before update 16 allow remote authenticated users to become the owner of a wiki page by editing the wiki page.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-45320",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-20T15:24:47.287313Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-05T17:20:58.251Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T14:09:56.686Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2022-45320"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Liferay Portal before 7.4.3.16 and Liferay DXP before 7.2 fix pack 19, 7.3 before update 6, and 7.4 before update 16 allow remote authenticated users to become the owner of a wiki page by editing the wiki page."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-20T04:48:11.109325",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2022-45320"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-45320",
    "datePublished": "2024-02-20T00:00:00",
    "dateReserved": "2022-11-14T00:00:00",
    "dateUpdated": "2024-08-03T14:09:56.686Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-33948
Vulnerability from cvelistv5
Published
2023-05-24 15:42
Modified
2024-10-22 15:51
Summary
The Dynamic Data Mapping module in Liferay Portal 7.4.3.67, and Liferay DXP 7.4 update 67 does not limit Document and Media files which can be downloaded from a Form, which allows remote attackers to download any file from Document and Media via a crafted URL.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.4.3.67
Create a notification for this product.
   Liferay DXP Version: 7.4.13.u67
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:54:13.907Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33948"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-33948",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-22T15:48:49.413660Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-22T15:51:37.861Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "status": "affected",
              "version": "7.4.3.67"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "status": "affected",
              "version": "7.4.13.u67"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The Dynamic Data Mapping module in Liferay Portal 7.4.3.67, and Liferay DXP 7.4 update 67 does not limit Document and Media files which can be downloaded from a Form, which allows remote attackers to download any file from Document and Media via a crafted URL."
            }
          ],
          "value": "The Dynamic Data Mapping module in Liferay Portal 7.4.3.67, and Liferay DXP 7.4 update 67 does not limit Document and Media files which can be downloaded from a Form, which allows remote attackers to download any file from Document and Media via a crafted URL."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-862",
              "description": "CWE-862 Missing Authorization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-24T15:42:39.906Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33948"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2023-33948",
    "datePublished": "2023-05-24T15:42:39.906Z",
    "dateReserved": "2023-05-24T02:36:00.165Z",
    "dateUpdated": "2024-10-22T15:51:37.861Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-26268
Vulnerability from cvelistv5
Published
2024-02-20 13:17
Modified
2024-08-15 17:50
Summary
User enumeration vulnerability in Liferay Portal 7.2.0 through 7.4.3.26, and older unsupported versions, and Liferay DXP 7.4 before update 27, 7.3 before update 8, 7.2 before fix pack 20, and older unsupported versions allows remote attackers to determine if an account exist in the application by comparing the request's response time.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.2.0
Create a notification for this product.
   Liferay DXP Version: 7.4.13
Version: 7.3.10
Version: 7.2.10
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T00:07:19.174Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-26268"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:liferay:liferay_enterprise_portal:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "liferay_enterprise_portal",
            "vendor": "liferay",
            "versions": [
              {
                "lessThanOrEqual": "7.4.3.26",
                "status": "affected",
                "version": "7.2.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:ibexa:digital_experience_platform:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "digital_experience_platform",
            "vendor": "ibexa",
            "versions": [
              {
                "lessThanOrEqual": "7.4.13.u26",
                "status": "affected",
                "version": "7.4.13",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "7.3.10.u7",
                "status": "affected",
                "version": "7.3.10",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "7.2.10-dxp-19",
                "status": "affected",
                "version": "7.2.10",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-26268",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-20T16:17:11.147707Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-15T17:50:15.783Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.26",
              "status": "affected",
              "version": "7.2.0",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.13.u26",
              "status": "affected",
              "version": "7.4.13",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.3.10.u7",
              "status": "affected",
              "version": "7.3.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.2.10-dxp-19",
              "status": "affected",
              "version": "7.2.10",
              "versionType": "maven"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Barnab\u00e1s Horv\u00e1th (T4r0)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "User enumeration vulnerability in Liferay Portal 7.2.0 through 7.4.3.26, and older unsupported versions, and Liferay DXP 7.4 before update 27, 7.3 before update 8, 7.2 before fix pack 20, and older unsupported versions allows remote attackers to determine if an account exist in the application by comparing the request\u0027s response time."
            }
          ],
          "value": "User enumeration vulnerability in Liferay Portal 7.2.0 through 7.4.3.26, and older unsupported versions, and Liferay DXP 7.4 before update 27, 7.3 before update 8, 7.2 before fix pack 20, and older unsupported versions allows remote attackers to determine if an account exist in the application by comparing the request\u0027s response time."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-203",
              "description": "CWE-203 Observable Discrepancy",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-21T03:50:53.570Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-26268"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2024-26268",
    "datePublished": "2024-02-20T13:17:28.137Z",
    "dateReserved": "2024-02-15T07:44:36.776Z",
    "dateUpdated": "2024-08-15T17:50:15.783Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-47798
Vulnerability from cvelistv5
Published
2024-02-08 02:55
Modified
2024-08-02 21:16
Summary
Account lockout in Liferay Portal 7.2.0 through 7.3.0, and older unsupported versions, and Liferay DXP 7.2 before fix pack 5, and older unsupported versions does not invalidate existing user sessions, which allows remote authenticated users to remain authenticated after an account has been locked.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T21:16:43.623Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-47798"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.3.0",
              "status": "affected",
              "version": "7.2.0",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.2.10-dxp-4",
              "status": "affected",
              "version": "7.2.10",
              "versionType": "maven"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Account lockout in Liferay Portal 7.2.0 through 7.3.0, and older unsupported versions, and Liferay DXP 7.2 before fix pack 5, and older unsupported versions does not invalidate existing user sessions, which allows remote authenticated users to remain authenticated after an account has been locked."
            }
          ],
          "value": "Account lockout in Liferay Portal 7.2.0 through 7.3.0, and older unsupported versions, and Liferay DXP 7.2 before fix pack 5, and older unsupported versions does not invalidate existing user sessions, which allows remote authenticated users to remain authenticated after an account has been locked."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-384",
              "description": "CWE-384 Session Fixation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-08T02:55:43.923Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-47798"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2023-47798",
    "datePublished": "2024-02-08T02:55:43.923Z",
    "dateReserved": "2023-11-10T01:49:20.188Z",
    "dateUpdated": "2024-08-02T21:16:43.623Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-42127
Vulnerability from cvelistv5
Published
2022-11-15 00:00
Modified
2024-08-03 13:03
Severity ?
Summary
The Friendly Url module in Liferay Portal 7.4.3.5 through 7.4.3.36, and Liferay DXP 7.4 update 1 though 36 does not properly check user permissions, which allows remote attackers to obtain the history of all friendly URLs that was assigned to a page.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T13:03:45.709Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://liferay.com"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42127"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://issues.liferay.com/browse/LPE-17607"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Friendly Url module in Liferay Portal 7.4.3.5 through 7.4.3.36, and Liferay DXP 7.4 update 1 though 36 does not properly check user permissions, which allows remote attackers to obtain the history of all friendly URLs that was assigned to a page."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-15T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "http://liferay.com"
        },
        {
          "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42127"
        },
        {
          "url": "https://issues.liferay.com/browse/LPE-17607"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-42127",
    "datePublished": "2022-11-15T00:00:00",
    "dateReserved": "2022-10-03T00:00:00",
    "dateUpdated": "2024-08-03T13:03:45.709Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-11993
Vulnerability from cvelistv5
Published
2024-12-17 20:24
Modified
2024-12-17 21:24
Summary
Reflected cross-site scripting (XSS) vulnerability in Liferay Portal 7.1.0 through 7.4.3.38, and Liferay DXP 7.4 GA through update 38, 7.3 GA through update 36, 7.2 GA through fix pack 20 and 7.1 GA through fix pack 28 allows remote attackers to execute arbitrary web script or HTML via Dispatch name field
Impacted products
Vendor Product Version
Liferay Portal Version: 7.1.0
Create a notification for this product.
   Liferay DXP Version: 7.1.10
Version: 7.2.10
Version: 7.3.10
Version: 7.4.13
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-11993",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-17T21:24:48.114546Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-17T21:24:55.247Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.38",
              "status": "affected",
              "version": "7.1.0",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "dxp-28",
              "status": "affected",
              "version": "7.1.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "dxp-20",
              "status": "affected",
              "version": "7.2.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.3.10-u36",
              "status": "affected",
              "version": "7.3.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.4.13-u38",
              "status": "affected",
              "version": "7.4.13",
              "versionType": "maven"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Liferay"
        },
        {
          "lang": "en",
          "type": "reporter",
          "value": "milCERT AT"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Reflected cross-site scripting (XSS) vulnerability in Liferay Portal 7.1.0 through 7.4.3.38, and Liferay DXP 7.4 GA through update 38, 7.3 GA through update 36, 7.2 GA through fix pack 20 and 7.1 GA through fix pack 28 allows remote attackers to execute arbitrary web script or HTML via Dispatch name field\u003cbr\u003e"
            }
          ],
          "value": "Reflected cross-site scripting (XSS) vulnerability in Liferay Portal 7.1.0 through 7.4.3.38, and Liferay DXP 7.4 GA through update 38, 7.3 GA through update 36, 7.2 GA through fix pack 20 and 7.1 GA through fix pack 28 allows remote attackers to execute arbitrary web script or HTML via Dispatch name field"
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "privilegesRequired": "HIGH",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "LOW",
            "subIntegrityImpact": "LOW",
            "userInteraction": "ACTIVE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "NONE",
            "vulnConfidentialityImpact": "LOW",
            "vulnIntegrityImpact": "LOW",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-17T20:24:42.600Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2024-11993"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2024-11993",
    "datePublished": "2024-12-17T20:24:42.600Z",
    "dateReserved": "2024-11-29T11:32:54.553Z",
    "dateUpdated": "2024-12-17T21:24:55.247Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-25152
Vulnerability from cvelistv5
Published
2024-02-21 02:00
Modified
2024-08-26 16:52
Severity ?
Summary
Stored cross-site scripting (XSS) vulnerability in Message Board widget in Liferay Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 17, and older unsupported versions allows remote authenticated users to inject arbitrary web script or HTML via the filename of an attachment.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.2.0
Create a notification for this product.
   Liferay DXP Version: 7.3.10
Version: 7.2.10
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T23:36:21.821Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25152"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:liferay:liferay_portal:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "liferay_portal",
            "vendor": "liferay",
            "versions": [
              {
                "lessThan": "7.4.2",
                "status": "affected",
                "version": "7.2.0",
                "versionType": "maven"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "digital_experience_platform",
            "vendor": "liferay",
            "versions": [
              {
                "lessThanOrEqual": "7.3.10-dxp-",
                "status": "affected",
                "version": "7.3.10",
                "versionType": "maven"
              },
              {
                "lessThanOrEqual": "7.2.10-dxp-16",
                "status": "affected",
                "version": "7.2.10",
                "versionType": "maven"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-25152",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-21T19:54:47.190614Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-26T16:52:06.441Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.2",
              "status": "affected",
              "version": "7.2.0",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.3.10-dxp-2",
              "status": "affected",
              "version": "7.3.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.2.10-dxp-16",
              "status": "affected",
              "version": "7.2.10",
              "versionType": "maven"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Stored cross-site scripting (XSS) vulnerability in Message Board widget in Liferay Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 17, and older unsupported versions allows remote authenticated users to inject arbitrary web script or HTML via the filename of an attachment."
            }
          ],
          "value": "Stored cross-site scripting (XSS) vulnerability in Message Board widget in Liferay Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 17, and older unsupported versions allows remote authenticated users to inject arbitrary web script or HTML via the filename of an attachment."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-21T02:00:32.694Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25152"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2024-25152",
    "datePublished": "2024-02-21T02:00:32.694Z",
    "dateReserved": "2024-02-06T10:32:42.567Z",
    "dateUpdated": "2024-08-26T16:52:06.441Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-33949
Vulnerability from cvelistv5
Published
2023-05-24 16:01
Modified
2024-10-22 15:51
Summary
In Liferay Portal 7.3.0 and earlier, and Liferay DXP 7.2 and earlier the default configuration does not require users to verify their email address, which allows remote attackers to create accounts using fake email addresses or email addresses which they don't control. The portal property `company.security.strangers.verify` should be set to true.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:54:14.057Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33949"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-33949",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-22T15:48:38.903885Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-22T15:51:31.464Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.3.0",
              "status": "affected",
              "version": "0",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThan": "7.3.10",
              "status": "affected",
              "version": "0",
              "versionType": "maven"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "In Liferay Portal 7.3.0 and earlier, and Liferay DXP 7.2 and earlier the default configuration does not require users to verify their email address, which allows remote attackers to create accounts using fake email addresses or email addresses which they don\u0027t control. The portal property `company.security.strangers.verify` should be set to true."
            }
          ],
          "value": "In Liferay Portal 7.3.0 and earlier, and Liferay DXP 7.2 and earlier the default configuration does not require users to verify their email address, which allows remote attackers to create accounts using fake email addresses or email addresses which they don\u0027t control. The portal property `company.security.strangers.verify` should be set to true."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1188",
              "description": "CWE-1188 Insecure Default Initialization of Resource",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-24T16:01:55.501Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33949"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2023-33949",
    "datePublished": "2023-05-24T16:01:55.501Z",
    "dateReserved": "2023-05-24T02:36:00.165Z",
    "dateUpdated": "2024-10-22T15:51:31.464Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-44310
Vulnerability from cvelistv5
Published
2023-10-17 09:28
Modified
2024-09-13 16:31
Severity ?
Summary
Stored cross-site scripting (XSS) vulnerability in Page Tree menu Liferay Portal 7.3.6 through 7.4.3.78, and Liferay DXP 7.3 fix pack 1 through update 23, and 7.4 before update 79 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into page's "Name" text field.
Impacted products
Vendor Product Version
Liferay DXP Version: 7.3.10.sp1
Version: 7.4.13
Create a notification for this product.
   Liferay Portal Version: 7.3.6
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T19:59:51.964Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-44310"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-44310",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-13T16:31:02.702958Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-13T16:31:11.575Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.3.10.u23",
              "status": "affected",
              "version": "7.3.10.sp1",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.4.13.u78",
              "status": "affected",
              "version": "7.4.13",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.78",
              "status": "affected",
              "version": "7.3.6",
              "versionType": "maven"
            }
          ]
        }
      ],
      "datePublic": "2023-10-17T07:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Stored cross-site scripting (XSS) vulnerability in Page Tree menu Liferay Portal 7.3.6 through 7.4.3.78, and Liferay DXP 7.3 fix pack 1 through update 23, and 7.4 before update 79 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into page\u0027s \"Name\" text field."
            }
          ],
          "value": "Stored cross-site scripting (XSS) vulnerability in Page Tree menu Liferay Portal 7.3.6 through 7.4.3.78, and Liferay DXP 7.3 fix pack 1 through update 23, and 7.4 before update 79 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into page\u0027s \"Name\" text field."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-17T09:28:17.244Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-44310"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2023-44310",
    "datePublished": "2023-10-17T09:28:17.244Z",
    "dateReserved": "2023-09-28T11:23:54.829Z",
    "dateUpdated": "2024-09-13T16:31:11.575Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-8980
Vulnerability from cvelistv5
Published
2024-10-22 14:43
Modified
2024-10-22 15:08
Severity ?
Summary
The Script Console in Liferay Portal 7.0.0 through 7.4.3.101, and Liferay DXP 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 GA through update 35, 7.2 GA through fix pack 20, 7.1 GA through fix pack 28, 7.0 GA through fix pack 102 and 6.2 GA through fix pack 173 does not sufficiently protect against Cross-Site Request Forgery (CSRF) attacks, which allows remote attackers to execute arbitrary Groovy script via a crafted URL or a XSS vulnerability.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.0.0
Create a notification for this product.
   Liferay DXP Version: 6.2.0
Version: 7.0.10
Version: 7.1.10
Version: 7.2.10
Version: 7.3.10
Version: 7.4.13
Version: 2023.Q3.1
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:liferay:portal:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "portal",
            "vendor": "liferay",
            "versions": [
              {
                "lessThanOrEqual": "7.4.3.101",
                "status": "affected",
                "version": "7.4.0",
                "versionType": "maven"
              },
              {
                "lessThanOrEqual": "7.3.7",
                "status": "affected",
                "version": "7.3.0",
                "versionType": "maven"
              },
              {
                "lessThanOrEqual": "7.2.1",
                "status": "affected",
                "version": "7.2.0",
                "versionType": "maven"
              },
              {
                "lessThanOrEqual": "7.1.3",
                "status": "affected",
                "version": "7.1.0",
                "versionType": "maven"
              },
              {
                "lessThanOrEqual": "2023.q3.4",
                "status": "affected",
                "version": "7.0.0",
                "versionType": "maven"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:liferay:dxp:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "dxp",
            "vendor": "liferay",
            "versions": [
              {
                "lessThanOrEqual": "2023.q3.4",
                "status": "affected",
                "version": "2023.q3.1",
                "versionType": "maven"
              },
              {
                "status": "affected",
                "version": "7.4"
              },
              {
                "lessThanOrEqual": "update35",
                "status": "affected",
                "version": "7.3ga",
                "versionType": "maven"
              },
              {
                "status": "affected",
                "version": "7.2"
              },
              {
                "status": "affected",
                "version": "7.1"
              },
              {
                "status": "affected",
                "version": "7.0"
              },
              {
                "status": "affected",
                "version": "6.2"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-8980",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-22T15:02:17.489238Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-22T15:08:48.472Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.101",
              "status": "affected",
              "version": "7.0.0",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "portal-173",
              "status": "affected",
              "version": "6.2.0",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "de-102",
              "status": "affected",
              "version": "7.0.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "dxp-28",
              "status": "affected",
              "version": "7.1.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "dxp-20",
              "status": "affected",
              "version": "7.2.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.3.10-u35",
              "status": "affected",
              "version": "7.3.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.4.13-u92",
              "status": "affected",
              "version": "7.4.13",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "2023.Q3.4",
              "status": "affected",
              "version": "2023.Q3.1",
              "versionType": "maven"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The Script Console in Liferay Portal 7.0.0 through 7.4.3.101, and Liferay DXP 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 GA through update 35, 7.2 GA through fix pack 20, 7.1 GA through fix pack 28, 7.0 GA through fix pack 102 and 6.2 GA through fix pack 173\u003cbr\u003e does not sufficiently protect against Cross-Site Request Forgery (CSRF) attacks, which allows remote attackers to execute arbitrary Groovy script via a crafted URL or a XSS vulnerability."
            }
          ],
          "value": "The Script Console in Liferay Portal 7.0.0 through 7.4.3.101, and Liferay DXP 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 GA through update 35, 7.2 GA through fix pack 20, 7.1 GA through fix pack 28, 7.0 GA through fix pack 102 and 6.2 GA through fix pack 173\n does not sufficiently protect against Cross-Site Request Forgery (CSRF) attacks, which allows remote attackers to execute arbitrary Groovy script via a crafted URL or a XSS vulnerability."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.6,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-352",
              "description": "CWE-352 Cross-Site Request Forgery (CSRF)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-22T14:43:04.606Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2024-8980"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2024-8980",
    "datePublished": "2024-10-22T14:43:04.606Z",
    "dateReserved": "2024-09-18T18:04:13.531Z",
    "dateUpdated": "2024-10-22T15:08:48.472Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-44311
Vulnerability from cvelistv5
Published
2023-10-17 09:39
Modified
2024-09-13 16:28
Severity ?
Summary
Multiple reflected cross-site scripting (XSS) vulnerabilities in the Plugin for OAuth 2.0 module's OAuth2ProviderApplicationRedirect class in Liferay Portal 7.4.3.41 through 7.4.3.89, and Liferay DXP 7.4 update 41 through update 89 allow remote attackers to inject arbitrary web script or HTML via the (1) code, or (2) error parameter. This issue is caused by an incomplete fix in CVE-2023-33941.
Impacted products
Vendor Product Version
Liferay DXP Version: 7.4.13.u41
Create a notification for this product.
   Liferay Portal Version: 7.4.3.41
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T19:59:51.988Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-44311"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-44311",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-13T16:28:36.237243Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-13T16:28:45.098Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.13.u89",
              "status": "affected",
              "version": "7.4.13.u41",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.89",
              "status": "affected",
              "version": "7.4.3.41",
              "versionType": "maven"
            }
          ]
        }
      ],
      "datePublic": "2023-10-17T07:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Multiple reflected cross-site scripting (XSS) vulnerabilities in the Plugin for OAuth 2.0 module\u0027s OAuth2ProviderApplicationRedirect class in Liferay Portal 7.4.3.41 through 7.4.3.89, and Liferay DXP 7.4 update 41 through update 89 allow remote attackers to inject arbitrary web script or HTML via the (1) code, or (2) error parameter. This issue is caused by an incomplete fix in CVE-2023-33941."
            }
          ],
          "value": "Multiple reflected cross-site scripting (XSS) vulnerabilities in the Plugin for OAuth 2.0 module\u0027s OAuth2ProviderApplicationRedirect class in Liferay Portal 7.4.3.41 through 7.4.3.89, and Liferay DXP 7.4 update 41 through update 89 allow remote attackers to inject arbitrary web script or HTML via the (1) code, or (2) error parameter. This issue is caused by an incomplete fix in CVE-2023-33941."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.6,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-17T09:39:07.508Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-44311"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2023-44311",
    "datePublished": "2023-10-17T09:39:07.508Z",
    "dateReserved": "2023-09-28T11:23:54.829Z",
    "dateUpdated": "2024-09-13T16:28:45.098Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-42129
Vulnerability from cvelistv5
Published
2022-11-15 00:00
Modified
2024-08-03 13:03
Severity ?
Summary
An Insecure direct object reference (IDOR) vulnerability in the Dynamic Data Mapping module in Liferay Portal 7.3.2 through 7.4.3.4, and Liferay DXP 7.3 before update 4, and 7.4 GA allows remote authenticated users to view and access form entries via the `formInstanceRecordId` parameter.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T13:03:45.442Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://liferay.com"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42129"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://issues.liferay.com/browse/LPE-17448"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An Insecure direct object reference (IDOR) vulnerability in the Dynamic Data Mapping module in Liferay Portal 7.3.2 through 7.4.3.4, and Liferay DXP 7.3 before update 4, and 7.4 GA allows remote authenticated users to view and access form entries via the `formInstanceRecordId` parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-15T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "http://liferay.com"
        },
        {
          "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42129"
        },
        {
          "url": "https://issues.liferay.com/browse/LPE-17448"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-42129",
    "datePublished": "2022-11-15T00:00:00",
    "dateReserved": "2022-10-03T00:00:00",
    "dateUpdated": "2024-08-03T13:03:45.442Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-26597
Vulnerability from cvelistv5
Published
2022-04-25 15:02
Modified
2024-08-03 05:11
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Layout module's Open Graph integration in Liferay Portal 7.3.0 through 7.4.0, and Liferay DXP 7.3 before service pack 3 allows remote attackers to inject arbitrary web script or HTML via the site name.
References
http://liferay.comx_refsource_MISC
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T05:11:42.693Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://liferay.com"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the Layout module\u0027s Open Graph integration in Liferay Portal 7.3.0 through 7.4.0, and Liferay DXP 7.3 before service pack 3 allows remote attackers to inject arbitrary web script or HTML via the site name."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-25T15:02:53",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://liferay.com"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2022-26597",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the Layout module\u0027s Open Graph integration in Liferay Portal 7.3.0 through 7.4.0, and Liferay DXP 7.3 before service pack 3 allows remote attackers to inject arbitrary web script or HTML via the site name."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://liferay.com",
              "refsource": "MISC",
              "url": "http://liferay.com"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-26597",
    "datePublished": "2022-04-25T15:02:53",
    "dateReserved": "2022-03-07T00:00:00",
    "dateUpdated": "2024-08-03T05:11:42.693Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-26273
Vulnerability from cvelistv5
Published
2024-10-22 15:01
Modified
2024-10-22 15:20
Summary
Cross-site request forgery (CSRF) vulnerability in the content page editor in Liferay Portal 7.4.0 through 7.4.3.103, and Liferay DXP 2023.Q4.0 through 2023.Q4.2, 2023.Q3.1 through 2023.Q3.5, 7.4 GA through update 92 and 7.3 update 29 through update 35 allows remote attackers to (1) change user passwords, (2) shut down the server, (3) execute arbitrary code in the scripting console, (4) and perform other administrative actions via the _com_liferay_commerce_catalog_web_internal_portlet_CommerceCatalogsPortlet_redirect parameter.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.4.0
Create a notification for this product.
   Liferay DXP Version: 7.3.10-u29
Version: 7.4.13
Version: 2023.Q3.1
Version: 2023.Q4.0
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:liferay:portal:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "portal",
            "vendor": "liferay",
            "versions": [
              {
                "lessThanOrEqual": "7.4.3.103",
                "status": "affected",
                "version": "7.4.0",
                "versionType": "maven"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:liferay:dxp:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "dxp",
            "vendor": "liferay",
            "versions": [
              {
                "lessThanOrEqual": "2023.q4.2",
                "status": "affected",
                "version": "2023.q4.0",
                "versionType": "maven"
              },
              {
                "lessThanOrEqual": "2023.q3.5",
                "status": "affected",
                "version": "2023.q3.1",
                "versionType": "maven"
              },
              {
                "status": "affected",
                "version": "7.4"
              },
              {
                "lessThanOrEqual": "update35",
                "status": "affected",
                "version": "7.3update29",
                "versionType": "maven"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-26273",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-22T15:18:21.690865Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-22T15:20:22.553Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.103",
              "status": "affected",
              "version": "7.4.0",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.3.10-u35",
              "status": "affected",
              "version": "7.3.10-u29",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.4.13-u92",
              "status": "affected",
              "version": "7.4.13",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "2023.Q3.5",
              "status": "affected",
              "version": "2023.Q3.1",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "2023.Q4.2",
              "status": "affected",
              "version": "2023.Q4.0",
              "versionType": "maven"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Cross-site request forgery (CSRF) vulnerability in the content page editor in Liferay Portal 7.4.0 through 7.4.3.103, and Liferay DXP 2023.Q4.0 through 2023.Q4.2, 2023.Q3.1 through 2023.Q3.5, 7.4 GA through update 92 and 7.3 update 29 through update 35 allows remote attackers to (1) change user passwords, (2) shut down the server, (3) execute arbitrary code in the scripting console, (4) and perform other administrative actions via the _com_liferay_commerce_catalog_web_internal_portlet_CommerceCatalogsPortlet_redirect parameter."
            }
          ],
          "value": "Cross-site request forgery (CSRF) vulnerability in the content page editor in Liferay Portal 7.4.0 through 7.4.3.103, and Liferay DXP 2023.Q4.0 through 2023.Q4.2, 2023.Q3.1 through 2023.Q3.5, 7.4 GA through update 92 and 7.3 update 29 through update 35 allows remote attackers to (1) change user passwords, (2) shut down the server, (3) execute arbitrary code in the scripting console, (4) and perform other administrative actions via the _com_liferay_commerce_catalog_web_internal_portlet_CommerceCatalogsPortlet_redirect parameter."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-352",
              "description": "CWE-352 Cross-Site Request Forgery (CSRF)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-22T15:01:29.395Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2024-26273"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2024-26273",
    "datePublished": "2024-10-22T15:01:29.395Z",
    "dateReserved": "2024-02-15T07:44:36.776Z",
    "dateUpdated": "2024-10-22T15:20:22.553Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-15839
Vulnerability from cvelistv5
Published
2020-09-22 17:27
Modified
2024-08-04 13:30
Severity ?
Summary
Liferay Portal before 7.3.3, and Liferay DXP 7.1 before fix pack 18 and 7.2 before fix pack 6, does not restrict the size of a multipart/form-data POST action, which allows remote authenticated users to conduct denial-of-service attacks by uploading large files.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T13:30:22.686Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/119784928"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://issues.liferay.com/browse/LPE-17029"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://issues.liferay.com/browse/LPE-17055"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Liferay Portal before 7.3.3, and Liferay DXP 7.1 before fix pack 18 and 7.2 before fix pack 6, does not restrict the size of a multipart/form-data POST action, which allows remote authenticated users to conduct denial-of-service attacks by uploading large files."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-09-22T17:27:49",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/119784928"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://issues.liferay.com/browse/LPE-17029"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://issues.liferay.com/browse/LPE-17055"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-15839",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Liferay Portal before 7.3.3, and Liferay DXP 7.1 before fix pack 18 and 7.2 before fix pack 6, does not restrict the size of a multipart/form-data POST action, which allows remote authenticated users to conduct denial-of-service attacks by uploading large files."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://portal.liferay.dev/learn/security/known-vulnerabilities",
              "refsource": "MISC",
              "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities"
            },
            {
              "name": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/119784928",
              "refsource": "CONFIRM",
              "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/119784928"
            },
            {
              "name": "https://issues.liferay.com/browse/LPE-17029",
              "refsource": "MISC",
              "url": "https://issues.liferay.com/browse/LPE-17029"
            },
            {
              "name": "https://issues.liferay.com/browse/LPE-17055",
              "refsource": "MISC",
              "url": "https://issues.liferay.com/browse/LPE-17055"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-15839",
    "datePublished": "2020-09-22T17:27:49",
    "dateReserved": "2020-07-20T00:00:00",
    "dateUpdated": "2024-08-04T13:30:22.686Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-33939
Vulnerability from cvelistv5
Published
2023-05-24 13:41
Modified
2024-10-22 15:52
Summary
Cross-site scripting (XSS) vulnerability in the Modified Facet widget in Liferay Portal 7.1.0 through 7.4.3.12, and Liferay DXP 7.1 before fix pack 27, 7.2 before fix pack 18, 7.3 before update 4, and 7.4 before update 9 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a facet label.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.1.0
Create a notification for this product.
   Liferay DXP Version: 7.1.10
Version: 7.2.10
Version: 7.3.10
Version: 7.4.13
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:54:13.948Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33939"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-33939",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-22T15:45:50.988282Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-22T15:52:40.777Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.12",
              "status": "affected",
              "version": "7.1.0",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.1.10-dxp-26",
              "status": "affected",
              "version": "7.1.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.2.10-dxp-17",
              "status": "affected",
              "version": "7.2.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.3.10-sp3",
              "status": "affected",
              "version": "7.3.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.4.13.u8",
              "status": "affected",
              "version": "7.4.13",
              "versionType": "maven"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Cross-site scripting (XSS) vulnerability in the Modified Facet widget in Liferay Portal 7.1.0 through 7.4.3.12, and Liferay DXP 7.1 before fix pack 27, 7.2 before fix pack 18, 7.3 before update 4, and 7.4 before update 9 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a facet label."
            }
          ],
          "value": "Cross-site scripting (XSS) vulnerability in the Modified Facet widget in Liferay Portal 7.1.0 through 7.4.3.12, and Liferay DXP 7.1 before fix pack 27, 7.2 before fix pack 18, 7.3 before update 4, and 7.4 before update 9 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a facet label."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-24T13:41:22.321Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33939"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2023-33939",
    "datePublished": "2023-05-24T13:41:22.321Z",
    "dateReserved": "2023-05-24T02:36:00.163Z",
    "dateUpdated": "2024-10-22T15:52:40.777Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-33942
Vulnerability from cvelistv5
Published
2023-05-24 14:49
Modified
2024-10-22 15:52
Summary
Cross-site scripting (XSS) vulnerability in the Web Content Display widget's article selector in Liferay Liferay Portal 7.4.3.50, and Liferay DXP 7.4 update 50 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a web content article's `Title` field.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.4.3.50
Create a notification for this product.
   Liferay DXP Version: 7.4.13.u50
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:54:13.949Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33942"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-33942",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-22T15:47:21.518857Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-22T15:52:20.409Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "status": "affected",
              "version": "7.4.3.50"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "status": "affected",
              "version": "7.4.13.u50"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Cross-site scripting (XSS) vulnerability in the Web Content Display widget\u0027s article selector in Liferay Liferay Portal 7.4.3.50, and Liferay DXP 7.4 update 50 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a web content article\u0027s `Title` field."
            }
          ],
          "value": "Cross-site scripting (XSS) vulnerability in the Web Content Display widget\u0027s article selector in Liferay Liferay Portal 7.4.3.50, and Liferay DXP 7.4 update 50 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a web content article\u0027s `Title` field."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-06-01T03:20:20.675Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33942"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2023-33942",
    "datePublished": "2023-05-24T14:49:17.472Z",
    "dateReserved": "2023-05-24T02:36:00.163Z",
    "dateUpdated": "2024-10-22T15:52:20.409Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-3426
Vulnerability from cvelistv5
Published
2023-08-02 09:40
Modified
2024-10-11 14:09
Summary
The organization selector in Liferay Portal 7.4.3.81 through 7.4.3.85, and Liferay DXP 7.4 update 81 through 85 does not check user permission, which allows remote authenticated users to obtain a list of all organizations.
Impacted products
Vendor Product Version
Liferay DXP Version: 7.4.13.u81
Create a notification for this product.
   Liferay Portal Version: 7.4.3.81
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T06:55:03.498Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-3426"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-3426",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-11T13:02:53.152164Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-11T14:09:13.856Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.13.u85",
              "status": "affected",
              "version": "7.4.13.u81",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.85",
              "status": "affected",
              "version": "7.4.3.81",
              "versionType": "maven"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "4rth4s"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The organization selector in Liferay Portal 7.4.3.81 through 7.4.3.85, and Liferay DXP 7.4 update 81 through 85 does not check user permission, which allows remote authenticated users to obtain a list of all organizations."
            }
          ],
          "value": "The organization selector in Liferay Portal 7.4.3.81 through 7.4.3.85, and Liferay DXP 7.4 update 81 through 85 does not check user permission, which allows remote authenticated users to obtain a list of all organizations."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-425",
              "description": "CWE-425 Direct Request (\u0027Forced Browsing\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-02T15:24:59.097Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-3426"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2023-3426",
    "datePublished": "2023-08-02T09:40:28.090Z",
    "dateReserved": "2023-06-27T05:43:01.235Z",
    "dateUpdated": "2024-10-11T14:09:13.856Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-42128
Vulnerability from cvelistv5
Published
2022-11-15 00:00
Modified
2024-08-03 13:03
Severity ?
Summary
The Hypermedia REST APIs module in Liferay Portal 7.4.1 through 7.4.3.4, and Liferay DXP 7.4 GA does not properly check permissions, which allows remote attackers to obtain a WikiNode object via the WikiNodeResource.getSiteWikiNodeByExternalReferenceCode API.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T13:03:44.987Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://liferay.com"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42128"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://issues.liferay.com/browse/LPE-17595"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Hypermedia REST APIs module in Liferay Portal 7.4.1 through 7.4.3.4, and Liferay DXP 7.4 GA does not properly check permissions, which allows remote attackers to obtain a WikiNode object via the WikiNodeResource.getSiteWikiNodeByExternalReferenceCode API."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-15T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "http://liferay.com"
        },
        {
          "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42128"
        },
        {
          "url": "https://issues.liferay.com/browse/LPE-17595"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-42128",
    "datePublished": "2022-11-15T00:00:00",
    "dateReserved": "2022-10-03T00:00:00",
    "dateUpdated": "2024-08-03T13:03:44.987Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-25609
Vulnerability from cvelistv5
Published
2024-02-20 09:37
Modified
2024-08-23 19:19
Summary
HtmlUtil.escapeRedirect in Liferay Portal 7.2.0 through 7.4.3.12, and older unsupported versions, and Liferay DXP 7.4 before update 9, 7.3 service pack 3, 7.2 fix pack 15 through 18, and older unsupported versions can be circumvented by using two forward slashes, which allows remote attackers to redirect users to arbitrary external URLs via the (1) 'redirect` parameter (2) `FORWARD_URL` parameter, and (3) others parameters that rely on HtmlUtil.escapeRedirect. This vulnerability is the result of an incomplete fix in CVE-2022-28977.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.2.0
Create a notification for this product.
   Liferay DXP Version: 7.4.13
Version: 7.3.10-dxp-3
Version: 7.2.10-dxp-15
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T23:44:09.679Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25609"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-25609",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-23T19:18:48.528753Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-23T19:19:20.308Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.12",
              "status": "affected",
              "version": "7.2.0",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.13.u8",
              "status": "affected",
              "version": "7.4.13",
              "versionType": "maven"
            },
            {
              "status": "affected",
              "version": "7.3.10-dxp-3"
            },
            {
              "lessThanOrEqual": "7.2.10-dxp-18",
              "status": "affected",
              "version": "7.2.10-dxp-15",
              "versionType": "maven"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "HtmlUtil.escapeRedirect in Liferay Portal 7.2.0 through 7.4.3.12, and older unsupported versions, and Liferay DXP 7.4 before update 9, 7.3 service pack 3, 7.2 fix pack 15 through 18, and older unsupported versions can be circumvented by using two forward slashes, which allows remote attackers to redirect users to arbitrary external URLs via the (1) \u0027redirect` parameter (2) `FORWARD_URL` parameter, and (3) others parameters that rely on HtmlUtil.escapeRedirect. This vulnerability is the result of an incomplete fix in CVE-2022-28977."
            }
          ],
          "value": "HtmlUtil.escapeRedirect in Liferay Portal 7.2.0 through 7.4.3.12, and older unsupported versions, and Liferay DXP 7.4 before update 9, 7.3 service pack 3, 7.2 fix pack 15 through 18, and older unsupported versions can be circumvented by using two forward slashes, which allows remote attackers to redirect users to arbitrary external URLs via the (1) \u0027redirect` parameter (2) `FORWARD_URL` parameter, and (3) others parameters that rely on HtmlUtil.escapeRedirect. This vulnerability is the result of an incomplete fix in CVE-2022-28977."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-601",
              "description": "CWE-601 URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-20T09:37:55.362Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25609"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2024-25609",
    "datePublished": "2024-02-20T09:37:55.362Z",
    "dateReserved": "2024-02-08T13:57:11.426Z",
    "dateUpdated": "2024-08-23T19:19:20.308Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-38266
Vulnerability from cvelistv5
Published
2022-03-02 23:00
Modified
2024-08-04 01:37
Severity ?
Summary
The Portal Security module in Liferay Portal 7.2.1 and earlier, and Liferay DXP 7.0 before fix pack 90, 7.1 before fix pack 17 and 7.2 before fix pack 5 does not correctly import users from LDAP, which allows remote attackers to prevent a legitimate user from authenticating by attempting to sign in as a user that exist in LDAP.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T01:37:16.310Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://liferay.com"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38266"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://issues.liferay.com/browse/LPE-17191"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Portal Security module in Liferay Portal 7.2.1 and earlier, and Liferay DXP 7.0 before fix pack 90, 7.1 before fix pack 17 and 7.2 before fix pack 5 does not correctly import users from LDAP, which allows remote attackers to prevent a legitimate user from authenticating by attempting to sign in as a user that exist in LDAP."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-19T14:52:13",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://liferay.com"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38266"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://issues.liferay.com/browse/LPE-17191"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-38266",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Portal Security module in Liferay Portal 7.2.1 and earlier, and Liferay DXP 7.0 before fix pack 90, 7.1 before fix pack 17 and 7.2 before fix pack 5 does not correctly import users from LDAP, which allows remote attackers to prevent a legitimate user from authenticating by attempting to sign in as a user that exist in LDAP."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://liferay.com",
              "refsource": "MISC",
              "url": "http://liferay.com"
            },
            {
              "name": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38266",
              "refsource": "MISC",
              "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38266"
            },
            {
              "name": "https://issues.liferay.com/browse/LPE-17191",
              "refsource": "MISC",
              "url": "https://issues.liferay.com/browse/LPE-17191"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-38266",
    "datePublished": "2022-03-02T23:00:44",
    "dateReserved": "2021-08-09T00:00:00",
    "dateUpdated": "2024-08-04T01:37:16.310Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-26269
Vulnerability from cvelistv5
Published
2024-02-21 02:39
Modified
2024-08-02 00:07
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Frontend JS module's portlet.js in Liferay Portal 7.2.0 through 7.4.3.37, and Liferay DXP 7.4 before update 38, 7.3 before update 11, 7.2 before fix pack 20, and older unsupported versions allows remote attackers to inject arbitrary web script or HTML via the anchor (hash) part of a URL.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.2.0
Create a notification for this product.
   Liferay DXP Version: 7.4.13
Version: 7.3.10
Version: 7.2.10
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:liferay:portal:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "portal",
            "vendor": "liferay",
            "versions": [
              {
                "lessThanOrEqual": "7.4.3.37",
                "status": "affected",
                "version": "7.2.0",
                "versionType": "maven"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:liferay:dxp:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "dxp",
            "vendor": "liferay",
            "versions": [
              {
                "lessThanOrEqual": "7.4.13.u37",
                "status": "affected",
                "version": "7.4.13",
                "versionType": "maven"
              },
              {
                "lessThanOrEqual": "7.3.10.u10",
                "status": "affected",
                "version": "7.3.10",
                "versionType": "maven"
              },
              {
                "lessThanOrEqual": "7.2.10-dxp-19",
                "status": "affected",
                "version": "7.2.10",
                "versionType": "maven"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-26269",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-21T16:16:54.489514Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-26T16:43:03.198Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T00:07:19.085Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-26269"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.37",
              "status": "affected",
              "version": "7.2.0",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.13.u37",
              "status": "affected",
              "version": "7.4.13",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.3.10.u10",
              "status": "affected",
              "version": "7.3.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.2.10-dxp-19",
              "status": "affected",
              "version": "7.2.10",
              "versionType": "maven"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Cross-site scripting (XSS) vulnerability in the Frontend JS module\u0027s portlet.js in Liferay Portal 7.2.0 through 7.4.3.37, and Liferay DXP 7.4 before update 38, 7.3 before update 11, 7.2 before fix pack 20, and older unsupported versions allows remote attackers to inject arbitrary web script or HTML via the anchor (hash) part of a URL."
            }
          ],
          "value": "Cross-site scripting (XSS) vulnerability in the Frontend JS module\u0027s portlet.js in Liferay Portal 7.2.0 through 7.4.3.37, and Liferay DXP 7.4 before update 38, 7.3 before update 11, 7.2 before fix pack 20, and older unsupported versions allows remote attackers to inject arbitrary web script or HTML via the anchor (hash) part of a URL."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.6,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-21T02:39:41.806Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-26269"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2024-26269",
    "datePublished": "2024-02-21T02:39:41.806Z",
    "dateReserved": "2024-02-15T07:44:36.776Z",
    "dateUpdated": "2024-08-02T00:07:19.085Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-42132
Vulnerability from cvelistv5
Published
2022-11-15 00:00
Modified
2024-08-03 13:03
Severity ?
Summary
The Test LDAP Users functionality in Liferay Portal 7.0.0 through 7.4.3.4, and Liferay DXP 7.0 fix pack 102 and earlier, 7.1 before fix pack 27, 7.2 before fix pack 17, 7.3 before update 4, and DXP 7.4 GA includes the LDAP credential in the page URL when paginating through the list of users, which allows man-in-the-middle attackers or attackers with access to the request logs to see the LDAP credential.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T13:03:45.198Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://liferay.com"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42132"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://issues.liferay.com/browse/LPE-17438"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Test LDAP Users functionality in Liferay Portal 7.0.0 through 7.4.3.4, and Liferay DXP 7.0 fix pack 102 and earlier, 7.1 before fix pack 27, 7.2 before fix pack 17, 7.3 before update 4, and DXP 7.4 GA includes the LDAP credential in the page URL when paginating through the list of users, which allows man-in-the-middle attackers or attackers with access to the request logs to see the LDAP credential."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-15T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "http://liferay.com"
        },
        {
          "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42132"
        },
        {
          "url": "https://issues.liferay.com/browse/LPE-17438"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-42132",
    "datePublished": "2022-11-15T00:00:00",
    "dateReserved": "2022-10-03T00:00:00",
    "dateUpdated": "2024-08-03T13:03:45.198Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-25146
Vulnerability from cvelistv5
Published
2022-03-02 23:28
Modified
2024-08-03 04:29
Severity ?
Summary
The Remote App module in Liferay Portal Liferay Portal v7.4.3.4 through v7.4.3.8 and Liferay DXP 7.4 before update 5 does not check if the origin of event messages it receives matches the origin of the Remote App, allowing attackers to exfiltrate the CSRF token via a crafted event message.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T04:29:01.763Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://liferay.com"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.securitum.pl"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-25146-csrf-token-exfiltration-via-remote-apps"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Remote App module in Liferay Portal Liferay Portal v7.4.3.4 through v7.4.3.8 and Liferay DXP 7.4 before update 5 does not check if the origin of event messages it receives matches the origin of the Remote App, allowing attackers to exfiltrate the CSRF token via a crafted event message."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-09-22T23:54:31",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://liferay.com"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.securitum.pl"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-25146-csrf-token-exfiltration-via-remote-apps"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2022-25146",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Remote App module in Liferay Portal Liferay Portal v7.4.3.4 through v7.4.3.8 and Liferay DXP 7.4 before update 5 does not check if the origin of event messages it receives matches the origin of the Remote App, allowing attackers to exfiltrate the CSRF token via a crafted event message."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://liferay.com",
              "refsource": "MISC",
              "url": "http://liferay.com"
            },
            {
              "name": "https://www.securitum.pl",
              "refsource": "MISC",
              "url": "https://www.securitum.pl"
            },
            {
              "name": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-25146-csrf-token-exfiltration-via-remote-apps",
              "refsource": "MISC",
              "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-25146-csrf-token-exfiltration-via-remote-apps"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-25146",
    "datePublished": "2022-03-02T23:28:42",
    "dateReserved": "2022-02-14T00:00:00",
    "dateUpdated": "2024-08-03T04:29:01.763Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-42497
Vulnerability from cvelistv5
Published
2023-10-17 07:56
Modified
2024-09-13 16:32
Severity ?
Summary
Reflected cross-site scripting (XSS) vulnerability on the Export for Translation page in Liferay Portal 7.4.3.4 through 7.4.3.85, and Liferay DXP 7.4 before update 86 allows remote attackers to inject arbitrary web script or HTML via the `_com_liferay_translation_web_internal_portlet_TranslationPortlet_redirect` parameter.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T19:23:38.911Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-42497"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-42497",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-13T16:32:09.323926Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-13T16:32:16.701Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.13.u85",
              "status": "affected",
              "version": "7.4.13",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.85",
              "status": "affected",
              "version": "7.4.3.4",
              "versionType": "maven"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Amin ACHOUR"
        }
      ],
      "datePublic": "2023-10-17T07:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Reflected cross-site scripting (XSS) vulnerability on the Export for Translation page in Liferay Portal 7.4.3.4 through 7.4.3.85, and Liferay DXP 7.4 before update 86 allows remote attackers to inject arbitrary web script or HTML via the `_com_liferay_translation_web_internal_portlet_TranslationPortlet_redirect` parameter.\u003cbr\u003e"
            }
          ],
          "value": "Reflected cross-site scripting (XSS) vulnerability on the Export for Translation page in Liferay Portal 7.4.3.4 through 7.4.3.85, and Liferay DXP 7.4 before update 86 allows remote attackers to inject arbitrary web script or HTML via the `_com_liferay_translation_web_internal_portlet_TranslationPortlet_redirect` parameter.\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.6,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-17T07:56:20.696Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-42497"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2023-42497",
    "datePublished": "2023-10-17T07:56:20.696Z",
    "dateReserved": "2023-09-11T08:54:24.312Z",
    "dateUpdated": "2024-09-13T16:32:16.701Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-42130
Vulnerability from cvelistv5
Published
2022-11-15 00:00
Modified
2024-08-03 13:03
Severity ?
Summary
The Dynamic Data Mapping module in Liferay Portal 7.1.0 through 7.4.3.4, and Liferay DXP 7.1 before fix pack 27, 7.2 before fix pack 19, 7.3 before update 4, and 7.4 GA does not properly check permission of form entries, which allows remote authenticated users to view and access all form entries.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T13:03:45.003Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://liferay.com"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42130"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://issues.liferay.com/browse/LPE-17447"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Dynamic Data Mapping module in Liferay Portal 7.1.0 through 7.4.3.4, and Liferay DXP 7.1 before fix pack 27, 7.2 before fix pack 19, 7.3 before update 4, and 7.4 GA does not properly check permission of form entries, which allows remote authenticated users to view and access all form entries."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-15T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "http://liferay.com"
        },
        {
          "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42130"
        },
        {
          "url": "https://issues.liferay.com/browse/LPE-17447"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-42130",
    "datePublished": "2022-11-15T00:00:00",
    "dateReserved": "2022-10-03T00:00:00",
    "dateUpdated": "2024-08-03T13:03:45.003Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-38268
Vulnerability from cvelistv5
Published
2022-03-02 18:45
Modified
2024-08-04 01:37
Severity ?
Summary
The Dynamic Data Mapping module in Liferay Portal 7.0.0 through 7.3.6, and Liferay DXP 7.0 before fix pack 101, 7.1 before fix pack 21, 7.2 before fix pack 10 and 7.3 before fix pack 2 incorrectly sets default permissions for site members, which allows remote authenticated users with the site member role to add and duplicate forms, via the UI or the API.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T01:37:16.326Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://liferay.com"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38268-site-member-can-add-new-forms-by-default"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38268-site-member-can-add-new-forms-by-default?_com_liferay_asset_publisher_web_portlet_AssetPublisherPortlet_INSTANCE_HbL5mxmVrnXW_assetEntryId=120882524\u0026_com_liferay_asset_publisher_web_portlet_AssetPublisherPortlet_INSTANCE_HbL5mxmVrnXW_redirect=https%3A%2F%2Fportal.liferay.dev%3A443%2Flearn%2Fsecurity%2Fknown-vulnerabilities%3Fp_p_id%3Dcom_liferay_asset_publisher_web_portlet_AssetP"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Dynamic Data Mapping module in Liferay Portal 7.0.0 through 7.3.6, and Liferay DXP 7.0 before fix pack 101, 7.1 before fix pack 21, 7.2 before fix pack 10 and 7.3 before fix pack 2 incorrectly sets default permissions for site members, which allows remote authenticated users with the site member role to add and duplicate forms, via the UI or the API."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-15T17:20:20",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://liferay.com"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38268-site-member-can-add-new-forms-by-default"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38268-site-member-can-add-new-forms-by-default?_com_liferay_asset_publisher_web_portlet_AssetPublisherPortlet_INSTANCE_HbL5mxmVrnXW_assetEntryId=120882524\u0026_com_liferay_asset_publisher_web_portlet_AssetPublisherPortlet_INSTANCE_HbL5mxmVrnXW_redirect=https%3A%2F%2Fportal.liferay.dev%3A443%2Flearn%2Fsecurity%2Fknown-vulnerabilities%3Fp_p_id%3Dcom_liferay_asset_publisher_web_portlet_AssetP"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-38268",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Dynamic Data Mapping module in Liferay Portal 7.0.0 through 7.3.6, and Liferay DXP 7.0 before fix pack 101, 7.1 before fix pack 21, 7.2 before fix pack 10 and 7.3 before fix pack 2 incorrectly sets default permissions for site members, which allows remote authenticated users with the site member role to add and duplicate forms, via the UI or the API."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://liferay.com",
              "refsource": "MISC",
              "url": "http://liferay.com"
            },
            {
              "name": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38268-site-member-can-add-new-forms-by-default",
              "refsource": "MISC",
              "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38268-site-member-can-add-new-forms-by-default"
            },
            {
              "name": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38268-site-member-can-add-new-forms-by-default?_com_liferay_asset_publisher_web_portlet_AssetPublisherPortlet_INSTANCE_HbL5mxmVrnXW_assetEntryId=120882524\u0026_com_liferay_asset_publisher_web_portlet_AssetPublisherPortlet_INSTANCE_HbL5mxmVrnXW_redirect=https%3A%2F%2Fportal.liferay.dev%3A443%2Flearn%2Fsecurity%2Fknown-vulnerabilities%3Fp_p_id%3Dcom_liferay_asset_publisher_web_portlet_AssetP",
              "refsource": "MISC",
              "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38268-site-member-can-add-new-forms-by-default?_com_liferay_asset_publisher_web_portlet_AssetPublisherPortlet_INSTANCE_HbL5mxmVrnXW_assetEntryId=120882524\u0026_com_liferay_asset_publisher_web_portlet_AssetPublisherPortlet_INSTANCE_HbL5mxmVrnXW_redirect=https%3A%2F%2Fportal.liferay.dev%3A443%2Flearn%2Fsecurity%2Fknown-vulnerabilities%3Fp_p_id%3Dcom_liferay_asset_publisher_web_portlet_AssetP"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-38268",
    "datePublished": "2022-03-02T18:45:26",
    "dateReserved": "2021-08-09T00:00:00",
    "dateUpdated": "2024-08-04T01:37:16.326Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-25601
Vulnerability from cvelistv5
Published
2024-02-21 01:54
Modified
2024-08-01 23:44
Severity ?
Summary
Stored cross-site scripting (XSS) vulnerability in Expando module's geolocation custom fields in Liferay Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 17, and older unsupported versions allows remote authenticated users to inject arbitrary web script or HTML via a crafted payload injected into the name text field of a geolocation custom field.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.2.0
Create a notification for this product.
   Liferay DXP Version: 7.3.10
Version: 7.2.10
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-25601",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-21T14:15:10.305868Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-05T17:21:48.975Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T23:44:09.660Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25601"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.2",
              "status": "affected",
              "version": "7.2.0",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.3.10-dxp-2",
              "status": "affected",
              "version": "7.3.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.2.10-dxp-16",
              "status": "affected",
              "version": "7.2.10",
              "versionType": "maven"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Stored cross-site scripting (XSS) vulnerability in Expando module\u0027s geolocation custom fields in Liferay Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 17, and older unsupported versions allows remote authenticated users to inject arbitrary web script or HTML via a crafted payload injected into the name text field of a geolocation custom field."
            }
          ],
          "value": "Stored cross-site scripting (XSS) vulnerability in Expando module\u0027s geolocation custom fields in Liferay Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 17, and older unsupported versions allows remote authenticated users to inject arbitrary web script or HTML via a crafted payload injected into the name text field of a geolocation custom field."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-21T01:54:47.283Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25601"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2024-25601",
    "datePublished": "2024-02-21T01:54:47.283Z",
    "dateReserved": "2024-02-08T13:57:11.425Z",
    "dateUpdated": "2024-08-01T23:44:09.660Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-38002
Vulnerability from cvelistv5
Published
2024-10-22 15:12
Modified
2024-10-22 15:22
Severity ?
Summary
The workflow component in Liferay Portal 7.3.2 through 7.4.3.111, and Liferay DXP 2023.Q4.0 through 2023.Q4.5, 2023.Q3.1 through 2023.Q3.8, 7.4 GA through update 92 and 7.3 GA through update 36 does not properly check user permissions before updating a workflow definition, which allows remote authenticated users to modify workflow definitions and execute arbitrary code (RCE) via the headless API.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.3.2
Version: 7.4.0
Create a notification for this product.
   Liferay DXP Version: 7.3.10
Version: 7.4.13
Version: 2023.Q3.1
Version: 2023.Q4.0
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:liferay:portal:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "portal",
            "vendor": "liferay",
            "versions": [
              {
                "lessThanOrEqual": "7.4.3.111",
                "status": "affected",
                "version": "7.4.0",
                "versionType": "maven"
              },
              {
                "lessThanOrEqual": "7.3.7",
                "status": "affected",
                "version": "7.3.2",
                "versionType": "maven"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:liferay:dxp:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "dxp",
            "vendor": "liferay",
            "versions": [
              {
                "lessThanOrEqual": "2023.q4.5",
                "status": "affected",
                "version": "2023.q4.0",
                "versionType": "maven"
              },
              {
                "lessThanOrEqual": "2023.q3.8",
                "status": "affected",
                "version": "2023.q3.1",
                "versionType": "maven"
              },
              {
                "status": "affected",
                "version": "7.4"
              },
              {
                "status": "affected",
                "version": "7.3"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-38002",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-22T15:21:03.278642Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-22T15:22:55.078Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.3.7",
              "status": "affected",
              "version": "7.3.2",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.4.3.111",
              "status": "affected",
              "version": "7.4.0",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.3.10-u36",
              "status": "affected",
              "version": "7.3.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.4.13-u92",
              "status": "affected",
              "version": "7.4.13",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "2023.Q3.8",
              "status": "affected",
              "version": "2023.Q3.1",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "2023.Q4.5",
              "status": "affected",
              "version": "2023.Q4.0",
              "versionType": "maven"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The workflow component in Liferay Portal 7.3.2 through 7.4.3.111, and Liferay DXP 2023.Q4.0 through 2023.Q4.5, 2023.Q3.1 through 2023.Q3.8, 7.4 GA through update 92 and 7.3 GA through update 36 does not properly check user permissions before updating a workflow definition, which allows remote authenticated users to modify workflow definitions and execute arbitrary code (RCE) via the headless API."
            }
          ],
          "value": "The workflow component in Liferay Portal 7.3.2 through 7.4.3.111, and Liferay DXP 2023.Q4.0 through 2023.Q4.5, 2023.Q3.1 through 2023.Q3.8, 7.4 GA through update 92 and 7.3 GA through update 36 does not properly check user permissions before updating a workflow definition, which allows remote authenticated users to modify workflow definitions and execute arbitrary code (RCE) via the headless API."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-863",
              "description": "CWE-863 Incorrect Authorization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-22T15:12:42.223Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2024-38002"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2024-38002",
    "datePublished": "2024-10-22T15:12:42.223Z",
    "dateReserved": "2024-06-11T15:40:10.985Z",
    "dateUpdated": "2024-10-22T15:22:55.078Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-42628
Vulnerability from cvelistv5
Published
2023-10-17 11:52
Modified
2024-08-02 19:23
Severity ?
Summary
Stored cross-site scripting (XSS) vulnerability in the Wiki widget in Liferay Portal 7.1.0 through 7.4.3.87, and Liferay DXP 7.0 fix pack 83 through 102, 7.1 fix pack 28 and earlier, 7.2 fix pack 20 and earlier, 7.3 update 33 and earlier, and 7.4 before update 88 allows remote attackers to inject arbitrary web script or HTML into a parent wiki page via a crafted payload injected into a wiki page's ‘Content’ text field.
Impacted products
Vendor Product Version
Liferay DXP Version: 7.0.10-de-83
Version: 7.1.10
Version: 7.2.10
Version: 7.3.10
Version: 7.4.13
Create a notification for this product.
   Liferay Portal Version: 7.1.0
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T19:23:40.284Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-42628"
          },
          {
            "tags": [
              "third-party-advisory",
              "exploit",
              "x_transferred"
            ],
            "url": "https://www.pentagrid.ch/en/blog/stored-cross-site-scripting-vulnerabilities-in-liferay-portal/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.0.10-*",
              "status": "affected",
              "version": "7.0.10-de-83",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.1.10-*",
              "status": "affected",
              "version": "7.1.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.2.10-*",
              "status": "affected",
              "version": "7.2.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.3.10-*",
              "status": "affected",
              "version": "7.3.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.4.13.u87",
              "status": "affected",
              "version": "7.4.13",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.87",
              "status": "affected",
              "version": "7.1.0",
              "versionType": "maven"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Michael Oelke"
        }
      ],
      "datePublic": "2023-10-17T11:55:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Stored cross-site scripting (XSS) vulnerability in the Wiki widget in Liferay Portal 7.1.0 through 7.4.3.87, and Liferay DXP 7.0 fix pack 83 through 102, 7.1 fix pack 28 and earlier, 7.2 fix pack 20 and earlier, 7.3 update 33 and earlier, and 7.4 before update 88 allows remote attackers to inject arbitrary web script or HTML into a parent wiki page via a crafted payload injected into a wiki page\u0027s \u2018Content\u2019 text field."
            }
          ],
          "value": "Stored cross-site scripting (XSS) vulnerability in the Wiki widget in Liferay Portal 7.1.0 through 7.4.3.87, and Liferay DXP 7.0 fix pack 83 through 102, 7.1 fix pack 28 and earlier, 7.2 fix pack 20 and earlier, 7.3 update 33 and earlier, and 7.4 before update 88 allows remote attackers to inject arbitrary web script or HTML into a parent wiki page via a crafted payload injected into a wiki page\u0027s \u2018Content\u2019 text field."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-10T02:32:30.141Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-42628"
        },
        {
          "tags": [
            "third-party-advisory",
            "exploit"
          ],
          "url": "https://www.pentagrid.ch/en/blog/stored-cross-site-scripting-vulnerabilities-in-liferay-portal/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2023-42628",
    "datePublished": "2023-10-17T11:52:45.867Z",
    "dateReserved": "2023-09-12T05:35:42.826Z",
    "dateUpdated": "2024-08-02T19:23:40.284Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-26596
Vulnerability from cvelistv5
Published
2022-04-25 15:41
Modified
2024-08-03 05:03
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Journal module's web content display configuration page in Liferay Portal 7.1.0 through 7.3.3, and Liferay DXP 7.0 before fix pack 94, 7.1 before fix pack 19, and 7.2 before fix pack 8, allows remote attackers to inject arbitrary web script or HTML via web content template names.
References
http://liferay.comx_refsource_MISC
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T05:03:32.954Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://liferay.com"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in Journal module\u0027s web content display configuration page in Liferay Portal 7.1.0 through 7.3.3, and Liferay DXP 7.0 before fix pack 94, 7.1 before fix pack 19, and 7.2 before fix pack 8, allows remote attackers to inject arbitrary web script or HTML via web content template names."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-25T15:41:28",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://liferay.com"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2022-26596",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in Journal module\u0027s web content display configuration page in Liferay Portal 7.1.0 through 7.3.3, and Liferay DXP 7.0 before fix pack 94, 7.1 before fix pack 19, and 7.2 before fix pack 8, allows remote attackers to inject arbitrary web script or HTML via web content template names."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://liferay.com",
              "refsource": "MISC",
              "url": "http://liferay.com"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-26596",
    "datePublished": "2022-04-25T15:41:28",
    "dateReserved": "2022-03-07T00:00:00",
    "dateUpdated": "2024-08-03T05:03:32.954Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-44308
Vulnerability from cvelistv5
Published
2024-02-20 06:29
Modified
2024-08-28 16:29
Summary
Open redirect vulnerability in adaptive media administration page in Liferay DXP 2023.Q3 before patch 6, and 7.4 GA through update 92 allows remote attackers to redirect users to arbitrary external URLs via the _com_liferay_adaptive_media_web_portlet_AMPortlet_redirect parameter.
Impacted products
Vendor Product Version
Liferay DXP Version: 2023.q3.1
Version: 7.4.13
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T19:59:52.152Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-44308"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "digital_experience_platform",
            "vendor": "liferay",
            "versions": [
              {
                "lessThanOrEqual": "7.4.13.u92",
                "status": "affected",
                "version": "7.4.13",
                "versionType": "maven"
              },
              {
                "lessThanOrEqual": "2023.q3.5",
                "status": "affected",
                "version": "2023.q3.1",
                "versionType": "maven"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-44308",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-20T17:01:28.479397Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-28T16:29:31.044Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "2023.q3.5",
              "status": "affected",
              "version": "2023.q3.1",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.4.13.u92",
              "status": "affected",
              "version": "7.4.13",
              "versionType": "maven"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Amin ACHOUR"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Open redirect vulnerability in adaptive media administration page in Liferay DXP 2023.Q3 before patch 6, and 7.4 GA through update 92 allows remote attackers to redirect users to arbitrary external URLs via the _com_liferay_adaptive_media_web_portlet_AMPortlet_redirect parameter."
            }
          ],
          "value": "Open redirect vulnerability in adaptive media administration page in Liferay DXP 2023.Q3 before patch 6, and 7.4 GA through update 92 allows remote attackers to redirect users to arbitrary external URLs via the _com_liferay_adaptive_media_web_portlet_AMPortlet_redirect parameter."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-601",
              "description": "CWE-601 URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-20T06:29:07.856Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-44308"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2023-44308",
    "datePublished": "2024-02-20T06:29:07.856Z",
    "dateReserved": "2023-09-28T11:23:54.828Z",
    "dateUpdated": "2024-08-28T16:29:31.044Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-25143
Vulnerability from cvelistv5
Published
2024-02-07 14:45
Modified
2024-10-02 15:29
Summary
The Document and Media widget In Liferay Portal 7.2.0 through 7.3.6, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 13, and older unsupported versions, does not limit resource consumption when generating a preview image, which allows remote authenticated users to cause a denial of service (memory consumption) via crafted PNG images.
Impacted products
Vendor Product Version
Liferay DXP Version: 7.3.10
Version: 7.2.10
Create a notification for this product.
   Liferay Portal Version: 7.2.0
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T23:36:21.826Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25143"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-25143",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-19T20:07:01.114816Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-19T20:07:09.484Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.3.10-dxp-2",
              "status": "affected",
              "version": "7.3.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.2.10-dxp-12",
              "status": "affected",
              "version": "7.2.10",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.3.6",
              "status": "affected",
              "version": "7.2.0",
              "versionType": "maven"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The Document and Media widget In Liferay Portal 7.2.0 through 7.3.6, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 13, and older unsupported versions, does not limit resource consumption when generating a preview image, which allows remote authenticated users to cause a denial of service (memory consumption) via crafted PNG images."
            }
          ],
          "value": "The Document and Media widget In Liferay Portal 7.2.0 through 7.3.6, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 13, and older unsupported versions, does not limit resource consumption when generating a preview image, which allows remote authenticated users to cause a denial of service (memory consumption) via crafted PNG images."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-770",
              "description": "CWE-770 Allocation of Resources Without Limits or Throttling",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-02T15:29:27.818Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25143"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2024-25143",
    "datePublished": "2024-02-07T14:45:04.168Z",
    "dateReserved": "2024-02-06T10:32:42.566Z",
    "dateUpdated": "2024-10-02T15:29:27.818Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-26266
Vulnerability from cvelistv5
Published
2024-02-21 02:32
Modified
2024-08-02 00:07
Severity ?
Summary
Multiple stored cross-site scripting (XSS) vulnerabilities in Liferay Portal 7.2.0 through 7.4.3.13, and older unsupported versions, and Liferay DXP 7.4 before update 10, 7.3 before update 4, 7.2 before fix pack 17, and older unsupported versions allow remote authenticated users to inject arbitrary web script or HTML via a crafted payload injected into the first/middle/last name text field of the user who creates an entry in the (1) Announcement widget, or (2) Alerts widget.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.2.0
Create a notification for this product.
   Liferay DXP Version: 7.4.13
Version: 7.3.10
Version: 7.2.10
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-26266",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-22T16:43:41.174610Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-05T17:21:55.881Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T00:07:18.940Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-26266"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.13",
              "status": "affected",
              "version": "7.2.0",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.13.u9",
              "status": "affected",
              "version": "7.4.13",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.3.10-dxp-3",
              "status": "affected",
              "version": "7.3.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.2.10-dxp-16",
              "status": "affected",
              "version": "7.2.10",
              "versionType": "maven"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Multiple stored cross-site scripting (XSS) vulnerabilities in Liferay Portal 7.2.0 through 7.4.3.13, and older unsupported versions, and Liferay DXP 7.4 before update 10, 7.3 before update 4, 7.2 before fix pack 17, and older unsupported versions allow remote authenticated users to inject arbitrary web script or HTML via a crafted payload injected into the first/middle/last name text field of the user who creates an entry in the (1) Announcement widget, or (2) Alerts widget."
            }
          ],
          "value": "Multiple stored cross-site scripting (XSS) vulnerabilities in Liferay Portal 7.2.0 through 7.4.3.13, and older unsupported versions, and Liferay DXP 7.4 before update 10, 7.3 before update 4, 7.2 before fix pack 17, and older unsupported versions allow remote authenticated users to inject arbitrary web script or HTML via a crafted payload injected into the first/middle/last name text field of the user who creates an entry in the (1) Announcement widget, or (2) Alerts widget."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-21T02:32:25.050Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-26266"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2024-26266",
    "datePublished": "2024-02-21T02:32:25.050Z",
    "dateReserved": "2024-02-15T07:44:36.776Z",
    "dateUpdated": "2024-08-02T00:07:18.940Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-37940
Vulnerability from cvelistv5
Published
2024-12-17 21:30
Modified
2024-12-17 21:41
Summary
Cross-site scripting (XSS) vulnerability in the edit Service Access Policy page in Liferay Portal 7.0.0 through 7.4.3.87, and Liferay DXP 7.4 GA through update 87, 7.3 GA through update 29, and older unsupported versions allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a service access policy's `Service Class` text field.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.0.0
Create a notification for this product.
   Liferay DXP Version: 7.0.10
Version: 7.1.10
Version: 7.2.10
Version: 7.3.10
Version: 7.4.13
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-37940",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-17T21:41:20.332148Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-17T21:41:38.543Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.87",
              "status": "affected",
              "version": "7.0.0",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "de-102",
              "status": "affected",
              "version": "7.0.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "dxp-28",
              "status": "affected",
              "version": "7.1.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "dxp-20",
              "status": "affected",
              "version": "7.2.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.3.10-u29",
              "status": "affected",
              "version": "7.3.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.4.13-u87",
              "status": "affected",
              "version": "7.4.13",
              "versionType": "maven"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "milCERT AT"
        },
        {
          "lang": "en",
          "type": "reporter",
          "value": "Abderrahmane BOUNHIDJA"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Cross-site scripting (XSS) vulnerability in the edit Service Access Policy page in Liferay Portal 7.0.0 through 7.4.3.87, and Liferay DXP 7.4 GA through update 87, 7.3 GA through update 29, and older unsupported versions allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a service access policy\u0027s `Service Class` text field."
            }
          ],
          "value": "Cross-site scripting (XSS) vulnerability in the edit Service Access Policy page in Liferay Portal 7.0.0 through 7.4.3.87, and Liferay DXP 7.4 GA through update 87, 7.3 GA through update 29, and older unsupported versions allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a service access policy\u0027s `Service Class` text field."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-17T21:30:39.730Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2023-37940"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2023-37940",
    "datePublished": "2024-12-17T21:30:39.730Z",
    "dateReserved": "2023-07-11T09:17:17.552Z",
    "dateUpdated": "2024-12-17T21:41:38.543Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-26271
Vulnerability from cvelistv5
Published
2024-10-22 14:06
Modified
2024-10-22 20:07
Summary
Cross-site request forgery (CSRF) vulnerability in the My Account widget in Liferay Portal 7.4.3.75 through 7.4.3.111, and Liferay DXP 2023.Q4.0 through 2023.Q4.2, 2023.Q3.1 through 2023.Q3.5, 7.4 update 75 through update 92 and 7.3 update 32 through update 36 allows remote attackers to (1) change user passwords, (2) shut down the server, (3) execute arbitrary code in the scripting console, (4) and perform other administrative actions via the _com_liferay_my_account_web_portlet_MyAccountPortlet_backURL parameter.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.4.3.75
Create a notification for this product.
   Liferay DXP Version: 7.3.10-u32
Version: 7.4.13-u75
Version: 2023.Q3.1
Version: 2023.Q4.0
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:liferay:portal:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "portal",
            "vendor": "liferay",
            "versions": [
              {
                "lessThanOrEqual": "7.4.3.75",
                "status": "affected",
                "version": "7.4.3.111",
                "versionType": "maven"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:liferay:dxp:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "dxp",
            "vendor": "liferay",
            "versions": [
              {
                "lessThanOrEqual": "7.3.10-u35",
                "status": "affected",
                "version": "7.3.10-u32",
                "versionType": "maven"
              },
              {
                "lessThanOrEqual": "7.4.13-u92",
                "status": "affected",
                "version": "7.4.13-u75",
                "versionType": "maven"
              },
              {
                "lessThanOrEqual": "2023.Q3.5",
                "status": "affected",
                "version": "2023.Q3.1",
                "versionType": "maven"
              },
              {
                "lessThanOrEqual": "2023.Q4.2",
                "status": "affected",
                "version": "2023.Q4.0",
                "versionType": "maven"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-26271",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-22T19:56:06.754670Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-22T20:07:01.935Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.111",
              "status": "affected",
              "version": "7.4.3.75",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.3.10-u35",
              "status": "affected",
              "version": "7.3.10-u32",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.4.13-u92",
              "status": "affected",
              "version": "7.4.13-u75",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "2023.Q3.5",
              "status": "affected",
              "version": "2023.Q3.1",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "2023.Q4.2",
              "status": "affected",
              "version": "2023.Q4.0",
              "versionType": "maven"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Cross-site request forgery (CSRF) vulnerability in the My Account widget in Liferay Portal 7.4.3.75 through 7.4.3.111, and Liferay DXP 2023.Q4.0 through 2023.Q4.2, 2023.Q3.1 through 2023.Q3.5, 7.4 update 75 through update 92 and 7.3 update 32 through update 36 allows remote attackers to (1) change user passwords, (2) shut down the server, (3) execute arbitrary code in the scripting console, (4) and perform other administrative actions via the _com_liferay_my_account_web_portlet_MyAccountPortlet_backURL parameter."
            }
          ],
          "value": "Cross-site request forgery (CSRF) vulnerability in the My Account widget in Liferay Portal 7.4.3.75 through 7.4.3.111, and Liferay DXP 2023.Q4.0 through 2023.Q4.2, 2023.Q3.1 through 2023.Q3.5, 7.4 update 75 through update 92 and 7.3 update 32 through update 36 allows remote attackers to (1) change user passwords, (2) shut down the server, (3) execute arbitrary code in the scripting console, (4) and perform other administrative actions via the _com_liferay_my_account_web_portlet_MyAccountPortlet_backURL parameter."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-352",
              "description": "CWE-352 Cross-Site Request Forgery (CSRF)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-22T14:06:16.533Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2024-26271"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2024-26271",
    "datePublished": "2024-10-22T14:06:16.533Z",
    "dateReserved": "2024-02-15T07:44:36.776Z",
    "dateUpdated": "2024-10-22T20:07:01.935Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-25603
Vulnerability from cvelistv5
Published
2024-02-21 02:09
Modified
2024-08-20 19:57
Severity ?
Summary
Stored cross-site scripting (XSS) vulnerability in the Dynamic Data Mapping module's DDMForm in Liferay Portal 7.2.0 through 7.4.3.4, and older unsupported versions, and Liferay DXP 7.4.13, 7.3 before update 4, 7.2 before fix pack 17, and older unsupported versions allows remote authenticated users to inject arbitrary web script or HTML via the instanceId parameter.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.2.0
Create a notification for this product.
   Liferay DXP Version: 7.4.13
Version: 7.3.10
Version: 7.2.10
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T23:44:09.668Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25603"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:liferay:portal:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "portal",
            "vendor": "liferay",
            "versions": [
              {
                "lessThanOrEqual": "7.4.3.4",
                "status": "affected",
                "version": "7.2.0",
                "versionType": "maven"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:liferay:digital_experience_platform:7.4.13:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "digital_experience_platform",
            "vendor": "liferay",
            "versions": [
              {
                "status": "affected",
                "version": "7.4.13"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "digital_experience_platform",
            "vendor": "liferay",
            "versions": [
              {
                "lessThanOrEqual": "7.3.10-dxp-3",
                "status": "affected",
                "version": "7.3.10",
                "versionType": "maven"
              },
              {
                "lessThanOrEqual": "7.2.10-dxp-16",
                "status": "affected",
                "version": "7.2.10",
                "versionType": "maven"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-25603",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-15T15:56:27.091382Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-20T19:57:19.139Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.4",
              "status": "affected",
              "version": "7.2.0",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "status": "affected",
              "version": "7.4.13"
            },
            {
              "lessThanOrEqual": "7.3.10-dxp-3",
              "status": "affected",
              "version": "7.3.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.2.10-dxp-16",
              "status": "affected",
              "version": "7.2.10",
              "versionType": "maven"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Stored cross-site scripting (XSS) vulnerability in the Dynamic Data Mapping module\u0027s DDMForm in Liferay Portal 7.2.0 through 7.4.3.4, and older unsupported versions, and Liferay DXP 7.4.13, 7.3 before update 4, 7.2 before fix pack 17, and older unsupported versions allows remote authenticated users to inject arbitrary web script or HTML via the instanceId parameter."
            }
          ],
          "value": "Stored cross-site scripting (XSS) vulnerability in the Dynamic Data Mapping module\u0027s DDMForm in Liferay Portal 7.2.0 through 7.4.3.4, and older unsupported versions, and Liferay DXP 7.4.13, 7.3 before update 4, 7.2 before fix pack 17, and older unsupported versions allows remote authenticated users to inject arbitrary web script or HTML via the instanceId parameter."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-21T02:09:59.923Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25603"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2024-25603",
    "datePublished": "2024-02-21T02:09:59.923Z",
    "dateReserved": "2024-02-08T13:57:11.425Z",
    "dateUpdated": "2024-08-20T19:57:19.139Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-33944
Vulnerability from cvelistv5
Published
2023-05-24 15:07
Modified
2024-10-22 15:52
Summary
Cross-site scripting (XSS) vulnerability in Layout module in Liferay Portal 7.3.4 through 7.4.3.68, and Liferay DXP 7.3 before update 24, and 7.4 before update 69 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a container type layout fragment's `URL` text field.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.3.4
Create a notification for this product.
   Liferay DXP Version: 7.3.10
Version: 7.4.13
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:54:13.400Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33944"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-33944",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-22T15:45:15.910473Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-22T15:52:07.008Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.68",
              "status": "affected",
              "version": "7.3.4",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.3.10.u23",
              "status": "affected",
              "version": "7.3.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.4.13.u68",
              "status": "affected",
              "version": "7.4.13",
              "versionType": "maven"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Cross-site scripting (XSS) vulnerability in Layout module in Liferay Portal 7.3.4 through 7.4.3.68, and Liferay DXP 7.3 before update 24, and 7.4 before update 69 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a container type layout fragment\u0027s `URL` text field."
            }
          ],
          "value": "Cross-site scripting (XSS) vulnerability in Layout module in Liferay Portal 7.3.4 through 7.4.3.68, and Liferay DXP 7.3 before update 24, and 7.4 before update 69 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a container type layout fragment\u0027s `URL` text field."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-24T15:07:14.026Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33944"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2023-33944",
    "datePublished": "2023-05-24T15:07:14.026Z",
    "dateReserved": "2023-05-24T02:36:00.164Z",
    "dateUpdated": "2024-10-22T15:52:07.008Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-25608
Vulnerability from cvelistv5
Published
2024-02-20 09:26
Modified
2024-08-01 23:44
Summary
HtmlUtil.escapeRedirect in Liferay Portal 7.2.0 through 7.4.3.18, and older unsupported versions, and Liferay DXP 7.4 before update 19, 7.3 before update 4, 7.2 before fix pack 19, and older unsupported versions can be circumvented by using the 'REPLACEMENT CHARACTER' (U+FFFD), which allows remote attackers to redirect users to arbitrary external URLs via the (1) 'redirect` parameter (2) `FORWARD_URL` parameter, (3) `noSuchEntryRedirect` parameter, and (4) others parameters that rely on HtmlUtil.escapeRedirect.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.2.0
Create a notification for this product.
   Liferay DXP Version: 7.4.13
Version: 7.3.10
Version: 7.2.10
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-25608",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-20T17:50:15.005965Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-05T17:21:47.059Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T23:44:09.704Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25608"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.18",
              "status": "affected",
              "version": "7.2.0",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.13.u18",
              "status": "affected",
              "version": "7.4.13",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.3.10-dxp-3",
              "status": "affected",
              "version": "7.3.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.2.10-dxp-18",
              "status": "affected",
              "version": "7.2.10",
              "versionType": "maven"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "HtmlUtil.escapeRedirect in Liferay Portal 7.2.0 through 7.4.3.18, and older unsupported versions, and Liferay DXP 7.4 before update 19, 7.3 before update 4, 7.2 before fix pack 19, and older unsupported versions can be circumvented by using the \u0027REPLACEMENT CHARACTER\u0027 (U+FFFD), which allows remote attackers to redirect users to arbitrary external URLs via the (1) \u0027redirect` parameter (2) `FORWARD_URL` parameter, (3) `noSuchEntryRedirect` parameter, and (4) others parameters that rely on HtmlUtil.escapeRedirect."
            }
          ],
          "value": "HtmlUtil.escapeRedirect in Liferay Portal 7.2.0 through 7.4.3.18, and older unsupported versions, and Liferay DXP 7.4 before update 19, 7.3 before update 4, 7.2 before fix pack 19, and older unsupported versions can be circumvented by using the \u0027REPLACEMENT CHARACTER\u0027 (U+FFFD), which allows remote attackers to redirect users to arbitrary external URLs via the (1) \u0027redirect` parameter (2) `FORWARD_URL` parameter, (3) `noSuchEntryRedirect` parameter, and (4) others parameters that rely on HtmlUtil.escapeRedirect."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-601",
              "description": "CWE-601 URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-20T09:26:10.743Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25608"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2024-25608",
    "datePublished": "2024-02-20T09:26:10.743Z",
    "dateReserved": "2024-02-08T13:57:11.426Z",
    "dateUpdated": "2024-08-01T23:44:09.704Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-26272
Vulnerability from cvelistv5
Published
2024-10-22 14:50
Modified
2024-10-22 15:17
Summary
Cross-site request forgery (CSRF) vulnerability in the content page editor in Liferay Portal 7.3.2 through 7.4.3.107, and Liferay DXP 2023.Q4.0 through 2023.Q4.2, 2023.Q3.1 through 2023.Q3.5, 7.4 GA through update 92 and 7.3 GA through update 35 allows remote attackers to (1) change user passwords, (2) shut down the server, (3) execute arbitrary code in the scripting console, (4) and perform other administrative actions via the p_l_back_url parameter.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.3.2
Version: 7.4.0
Create a notification for this product.
   Liferay DXP Version: 7.3.10
Version: 7.4.13
Version: 2023.Q3.1
Version: 2023.Q4.0
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:liferay:portal:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "portal",
            "vendor": "liferay",
            "versions": [
              {
                "lessThanOrEqual": "7.4.3.107",
                "status": "affected",
                "version": "7.4.0",
                "versionType": "maven"
              },
              {
                "lessThanOrEqual": "7.3.7",
                "status": "affected",
                "version": "7.3.2",
                "versionType": "maven"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:liferay:dxp:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "dxp",
            "vendor": "liferay",
            "versions": [
              {
                "lessThanOrEqual": "2023.q4.2",
                "status": "affected",
                "version": "2023.q4.0",
                "versionType": "maven"
              },
              {
                "lessThanOrEqual": "2023.q3.5",
                "status": "affected",
                "version": "2023.q3.1",
                "versionType": "maven"
              },
              {
                "status": "affected",
                "version": "7.4"
              },
              {
                "lessThanOrEqual": "update35",
                "status": "affected",
                "version": "7.3ga",
                "versionType": "maven"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-26272",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-22T15:15:06.259842Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-22T15:17:20.008Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.3.7",
              "status": "affected",
              "version": "7.3.2",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.4.3.107",
              "status": "affected",
              "version": "7.4.0",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.3.10-u35",
              "status": "affected",
              "version": "7.3.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.4.13-u92",
              "status": "affected",
              "version": "7.4.13",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "2023.Q3.5",
              "status": "affected",
              "version": "2023.Q3.1",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "2023.Q4.2",
              "status": "affected",
              "version": "2023.Q4.0",
              "versionType": "maven"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Cross-site request forgery (CSRF) vulnerability in the content page editor in Liferay Portal 7.3.2 through 7.4.3.107, and Liferay DXP 2023.Q4.0 through 2023.Q4.2, 2023.Q3.1 through 2023.Q3.5, 7.4 GA through update 92 and 7.3 GA through update 35 allows remote attackers to (1) change user passwords, (2) shut down the server, (3) execute arbitrary code in the scripting console, (4) and perform other administrative actions via the p_l_back_url parameter."
            }
          ],
          "value": "Cross-site request forgery (CSRF) vulnerability in the content page editor in Liferay Portal 7.3.2 through 7.4.3.107, and Liferay DXP 2023.Q4.0 through 2023.Q4.2, 2023.Q3.1 through 2023.Q3.5, 7.4 GA through update 92 and 7.3 GA through update 35 allows remote attackers to (1) change user passwords, (2) shut down the server, (3) execute arbitrary code in the scripting console, (4) and perform other administrative actions via the p_l_back_url parameter."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-352",
              "description": "CWE-352 Cross-Site Request Forgery (CSRF)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-22T14:50:41.505Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2024-26272"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2024-26272",
    "datePublished": "2024-10-22T14:50:41.505Z",
    "dateReserved": "2024-02-15T07:44:36.776Z",
    "dateUpdated": "2024-10-22T15:17:20.008Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-25147
Vulnerability from cvelistv5
Published
2024-02-21 01:16
Modified
2024-08-01 23:36
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in HtmlUtil.escapeJsLink in Liferay Portal 7.2.0 through 7.4.1, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 15, and older unsupported versions allows remote attackers to inject arbitrary web script or HTML via crafted javascript: style links.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.2.0
Create a notification for this product.
   Liferay DXP Version: 7.3.10
Version: 7.2.10
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:liferay:portal:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "portal",
            "vendor": "liferay",
            "versions": [
              {
                "lessThanOrEqual": "7.4.1",
                "status": "affected",
                "version": "7.2.0",
                "versionType": "maven"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:liferay:dxp:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "dxp",
            "vendor": "liferay",
            "versions": [
              {
                "lessThanOrEqual": "7.3.10-dxp-2",
                "status": "affected",
                "version": "7.3.10",
                "versionType": "maven"
              },
              {
                "lessThanOrEqual": "7.2.10-dxp-14",
                "status": "affected",
                "version": "7.2.10",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-25147",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-21T16:15:43.147628Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-26T16:49:27.250Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T23:36:21.759Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25147"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.1",
              "status": "affected",
              "version": "7.2.0",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.3.10-dxp-2",
              "status": "affected",
              "version": "7.3.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.2.10-dxp-14",
              "status": "affected",
              "version": "7.2.10",
              "versionType": "maven"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Cross-site scripting (XSS) vulnerability in HtmlUtil.escapeJsLink in Liferay Portal 7.2.0 through 7.4.1, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 15, and older unsupported versions allows remote attackers to inject arbitrary web script or HTML via crafted javascript: style links."
            }
          ],
          "value": "Cross-site scripting (XSS) vulnerability in HtmlUtil.escapeJsLink in Liferay Portal 7.2.0 through 7.4.1, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 15, and older unsupported versions allows remote attackers to inject arbitrary web script or HTML via crafted javascript: style links."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.6,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-21T01:16:21.256Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25147"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2024-25147",
    "datePublished": "2024-02-21T01:16:21.256Z",
    "dateReserved": "2024-02-06T10:32:42.567Z",
    "dateUpdated": "2024-08-01T23:36:21.759Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-25149
Vulnerability from cvelistv5
Published
2024-02-20 07:00
Modified
2024-08-01 23:36
Summary
Liferay Portal 7.2.0 through 7.4.1, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 15, and older unsupported versions does not properly restrict membership of a child site when the "Limit membership to members of the parent site" option is enabled, which allows remote authenticated users to add users who are not a member of the parent site to a child site. The added user may obtain permission to perform unauthorized actions in the child site.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.2.0
Create a notification for this product.
   Liferay DXP Version: 7.3.10
Version: 7.2.10
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-25149",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-22T17:46:50.710330Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:35:34.318Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T23:36:21.703Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25149"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.1",
              "status": "affected",
              "version": "7.2.0",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.3.10-dxp-2",
              "status": "affected",
              "version": "7.3.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.2.10-dxp-14",
              "status": "affected",
              "version": "7.2.10",
              "versionType": "maven"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Liferay Portal 7.2.0 through 7.4.1, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 15, and older unsupported versions does not properly restrict membership of a child site when the \"Limit membership to members of the parent site\" option is enabled, which allows remote authenticated users to add users who are not a member of the parent site to a child site. The added user may obtain permission to perform unauthorized actions in the child site."
            }
          ],
          "value": "Liferay Portal 7.2.0 through 7.4.1, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 15, and older unsupported versions does not properly restrict membership of a child site when the \"Limit membership to members of the parent site\" option is enabled, which allows remote authenticated users to add users who are not a member of the parent site to a child site. The added user may obtain permission to perform unauthorized actions in the child site."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-863",
              "description": "CWE-863 Incorrect Authorization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-20T07:00:19.650Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25149"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2024-25149",
    "datePublished": "2024-02-20T07:00:19.650Z",
    "dateReserved": "2024-02-06T10:32:42.567Z",
    "dateUpdated": "2024-08-01T23:36:21.703Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-33940
Vulnerability from cvelistv5
Published
2023-05-24 13:55
Modified
2024-10-22 15:52
Summary
Cross-site scripting (XSS) vulnerability in IFrame type Remote Apps in Liferay Portal 7.4.0 through 7.4.3.30, and Liferay DXP 7.4 before update 31 allows remote attackers to inject arbitrary web script or HTML via the Remote App's IFrame URL.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:54:13.784Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33940"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-33940",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-22T15:45:34.553380Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-22T15:52:33.662Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.30",
              "status": "affected",
              "version": "7.4.0",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.13.u30",
              "status": "affected",
              "version": "7.4.13",
              "versionType": "maven"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Cross-site scripting (XSS) vulnerability in IFrame type Remote Apps in Liferay Portal 7.4.0 through 7.4.3.30, and Liferay DXP 7.4 before update 31 allows remote attackers to inject arbitrary web script or HTML via the Remote App\u0027s IFrame URL."
            }
          ],
          "value": "Cross-site scripting (XSS) vulnerability in IFrame type Remote Apps in Liferay Portal 7.4.0 through 7.4.3.30, and Liferay DXP 7.4 before update 31 allows remote attackers to inject arbitrary web script or HTML via the Remote App\u0027s IFrame URL."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-24T13:55:23.431Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33940"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2023-33940",
    "datePublished": "2023-05-24T13:55:23.431Z",
    "dateReserved": "2023-05-24T02:36:00.163Z",
    "dateUpdated": "2024-10-22T15:52:33.662Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-38263
Vulnerability from cvelistv5
Published
2022-03-02 23:10
Modified
2024-08-04 01:37
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Server module's script console in Liferay Portal 7.3.2 and earlier, and Liferay DXP 7.0 before fix pack 101, 7.1 before fix pack 20 and 7.2 before fix pack 10 allows remote attackers to inject arbitrary web script or HTML via the output of a script.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T01:37:16.466Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://liferay.com"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38263-reflected-xss-with-script-page"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://issues.liferay.com/browse/LPE-17061"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the Server module\u0027s script console in Liferay Portal 7.3.2 and earlier, and Liferay DXP 7.0 before fix pack 101, 7.1 before fix pack 20 and 7.2 before fix pack 10 allows remote attackers to inject arbitrary web script or HTML via the output of a script."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-15T11:18:04",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://liferay.com"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38263-reflected-xss-with-script-page"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://issues.liferay.com/browse/LPE-17061"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-38263",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the Server module\u0027s script console in Liferay Portal 7.3.2 and earlier, and Liferay DXP 7.0 before fix pack 101, 7.1 before fix pack 20 and 7.2 before fix pack 10 allows remote attackers to inject arbitrary web script or HTML via the output of a script."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://liferay.com",
              "refsource": "MISC",
              "url": "http://liferay.com"
            },
            {
              "name": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38263-reflected-xss-with-script-page",
              "refsource": "MISC",
              "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38263-reflected-xss-with-script-page"
            },
            {
              "name": "https://issues.liferay.com/browse/LPE-17061",
              "refsource": "MISC",
              "url": "https://issues.liferay.com/browse/LPE-17061"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-38263",
    "datePublished": "2022-03-02T23:10:21",
    "dateReserved": "2021-08-09T00:00:00",
    "dateUpdated": "2024-08-04T01:37:16.466Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-26593
Vulnerability from cvelistv5
Published
2022-04-19 12:46
Modified
2024-08-03 05:03
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Asset module's asset categories selector in Liferay Portal 7.3.3 through 7.4.0, and Liferay DXP 7.3 before service pack 3 allows remote attackers to inject arbitrary web script or HTML via the name of a asset category.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T05:03:33.251Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://liferay.com"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-26593-stored-xss-with-category-name-in-asset-categories-selector"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the Asset module\u0027s asset categories selector in Liferay Portal 7.3.3 through 7.4.0, and Liferay DXP 7.3 before service pack 3 allows remote attackers to inject arbitrary web script or HTML via the name of a asset category."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-19T12:46:15",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://liferay.com"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-26593-stored-xss-with-category-name-in-asset-categories-selector"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2022-26593",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the Asset module\u0027s asset categories selector in Liferay Portal 7.3.3 through 7.4.0, and Liferay DXP 7.3 before service pack 3 allows remote attackers to inject arbitrary web script or HTML via the name of a asset category."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://liferay.com",
              "refsource": "MISC",
              "url": "http://liferay.com"
            },
            {
              "name": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-26593-stored-xss-with-category-name-in-asset-categories-selector",
              "refsource": "MISC",
              "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-26593-stored-xss-with-category-name-in-asset-categories-selector"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-26593",
    "datePublished": "2022-04-19T12:46:15",
    "dateReserved": "2022-03-07T00:00:00",
    "dateUpdated": "2024-08-03T05:03:33.251Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-5190
Vulnerability from cvelistv5
Published
2024-02-20 06:03
Modified
2024-08-02 07:52
Summary
Open redirect vulnerability in the Countries Management’s edit region page in Liferay Portal 7.4.3.45 through 7.4.3.101, and Liferay DXP 2023.Q3 before patch 6, and 7.4 update 45 through 92 allows remote attackers to redirect users to arbitrary external URLs via the _com_liferay_address_web_internal_portlet_CountriesManagementAdminPortlet_redirect parameter.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.4.3.45
Create a notification for this product.
   Liferay DXP Version: 2023.q3.1
Version: 7.4.13.u45
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-5190",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-20T18:29:08.593069Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-05T17:21:47.322Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T07:52:07.791Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-5190"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.101",
              "status": "affected",
              "version": "7.4.3.45",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "2023.q3.5",
              "status": "affected",
              "version": "2023.q3.1",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.4.13.u92",
              "status": "affected",
              "version": "7.4.13.u45",
              "versionType": "maven"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Amin ACHOUR"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Open redirect vulnerability in the Countries Management\u2019s edit region page in Liferay Portal 7.4.3.45 through 7.4.3.101, and Liferay DXP 2023.Q3 before patch 6, and 7.4 update 45 through 92 allows remote attackers to redirect users to arbitrary external URLs via the _com_liferay_address_web_internal_portlet_CountriesManagementAdminPortlet_redirect parameter."
            }
          ],
          "value": "Open redirect vulnerability in the Countries Management\u2019s edit region page in Liferay Portal 7.4.3.45 through 7.4.3.101, and Liferay DXP 2023.Q3 before patch 6, and 7.4 update 45 through 92 allows remote attackers to redirect users to arbitrary external URLs via the _com_liferay_address_web_internal_portlet_CountriesManagementAdminPortlet_redirect parameter."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-601",
              "description": "CWE-601 URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-20T06:03:45.941Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-5190"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2023-5190",
    "datePublished": "2024-02-20T06:03:45.941Z",
    "dateReserved": "2023-09-26T05:30:24.925Z",
    "dateUpdated": "2024-08-02T07:52:07.791Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-42496
Vulnerability from cvelistv5
Published
2024-02-21 02:21
Modified
2024-08-02 19:23
Severity ?
Summary
Reflected cross-site scripting (XSS) vulnerability on the add assignees to a role page in Liferay Portal 7.3.3 through 7.4.3.97, and Liferay DXP 2023.Q3 before patch 6, 7.4 GA through update 92, and 7.3 before update 34 allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_roles_admin_web_portlet_RolesAdminPortlet_tabs2 parameter.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.3.3
Create a notification for this product.
   Liferay DXP Version: 2023.q3.1
Version: 7.4.13
Version: 7.3.10
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-42496",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-21T16:07:22.225984Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-05T17:21:50.222Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T19:23:39.433Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-42496"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.97",
              "status": "affected",
              "version": "7.3.3",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "2023.q3.5",
              "status": "affected",
              "version": "2023.q3.1",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.4.13.u92",
              "status": "affected",
              "version": "7.4.13",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.3.10-dxp-33",
              "status": "affected",
              "version": "7.3.10",
              "versionType": "maven"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Amin ACHOUR"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Reflected cross-site scripting (XSS) vulnerability on the add assignees to a role page in Liferay Portal 7.3.3 through 7.4.3.97, and Liferay DXP 2023.Q3 before patch 6, 7.4 GA through update 92, and 7.3 before update 34 allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_roles_admin_web_portlet_RolesAdminPortlet_tabs2 parameter."
            }
          ],
          "value": "Reflected cross-site scripting (XSS) vulnerability on the add assignees to a role page in Liferay Portal 7.3.3 through 7.4.3.97, and Liferay DXP 2023.Q3 before patch 6, 7.4 GA through update 92, and 7.3 before update 34 allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_roles_admin_web_portlet_RolesAdminPortlet_tabs2 parameter."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.6,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-21T02:21:01.515Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-42496"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2023-42496",
    "datePublished": "2024-02-21T02:21:01.515Z",
    "dateReserved": "2023-09-11T08:54:24.311Z",
    "dateUpdated": "2024-08-02T19:23:39.433Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-26595
Vulnerability from cvelistv5
Published
2022-04-19 12:52
Modified
2024-08-03 05:03
Severity ?
Summary
Liferay Portal 7.3.7, 7.4.0, and 7.4.1, and Liferay DXP 7.2 fix pack 13, and 7.3 fix pack 2 does not properly check user permission when accessing a list of sites/groups, which allows remote authenticated users to view sites/groups via the user's site membership assignment UI.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T05:03:33.282Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://liferay.com"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-26595-unauthorized-access-to-site-group-list"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Liferay Portal 7.3.7, 7.4.0, and 7.4.1, and Liferay DXP 7.2 fix pack 13, and 7.3 fix pack 2 does not properly check user permission when accessing a list of sites/groups, which allows remote authenticated users to view sites/groups via the user\u0027s site membership assignment UI."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-19T12:52:20",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://liferay.com"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-26595-unauthorized-access-to-site-group-list"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2022-26595",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Liferay Portal 7.3.7, 7.4.0, and 7.4.1, and Liferay DXP 7.2 fix pack 13, and 7.3 fix pack 2 does not properly check user permission when accessing a list of sites/groups, which allows remote authenticated users to view sites/groups via the user\u0027s site membership assignment UI."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://liferay.com",
              "refsource": "MISC",
              "url": "http://liferay.com"
            },
            {
              "name": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-26595-unauthorized-access-to-site-group-list",
              "refsource": "MISC",
              "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-26595-unauthorized-access-to-site-group-list"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-26595",
    "datePublished": "2022-04-19T12:52:20",
    "dateReserved": "2022-03-07T00:00:00",
    "dateUpdated": "2024-08-03T05:03:33.282Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-25602
Vulnerability from cvelistv5
Published
2024-02-21 01:45
Modified
2024-08-01 23:44
Severity ?
Summary
Stored cross-site scripting (XSS) vulnerability in Users Admin module's edit user page in Liferay Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 17, and older unsupported versions allows remote authenticated users to inject arbitrary web script or HTML via a crafted payload injected into an organization’s “Name” text field
Impacted products
Vendor Product Version
Liferay Portal Version: 7.2.0
Create a notification for this product.
   Liferay DXP Version: 7.3.10
Version: 7.2.10
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-25602",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-21T15:23:34.173155Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-05T17:20:59.028Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T23:44:09.672Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25602"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.2",
              "status": "affected",
              "version": "7.2.0",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.3.10-dxp-2",
              "status": "affected",
              "version": "7.3.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.2.10-dxp-16",
              "status": "affected",
              "version": "7.2.10",
              "versionType": "maven"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Stored cross-site scripting (XSS) vulnerability in Users Admin module\u0027s edit user page in Liferay Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 17, and older unsupported versions allows remote authenticated users to inject arbitrary web script or HTML via a crafted payload injected into an organization\u2019s \u201cName\u201d text field"
            }
          ],
          "value": "Stored cross-site scripting (XSS) vulnerability in Users Admin module\u0027s edit user page in Liferay Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 17, and older unsupported versions allows remote authenticated users to inject arbitrary web script or HTML via a crafted payload injected into an organization\u2019s \u201cName\u201d text field"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-21T01:45:15.312Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25602"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2024-25602",
    "datePublished": "2024-02-21T01:45:15.312Z",
    "dateReserved": "2024-02-08T13:57:11.425Z",
    "dateUpdated": "2024-08-01T23:44:09.672Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-33941
Vulnerability from cvelistv5
Published
2023-05-24 14:36
Modified
2024-10-22 15:52
Summary
Multiple cross-site scripting (XSS) vulnerabilities in the Plugin for OAuth 2.0 module's OAuth2ProviderApplicationRedirect class in Liferay Portal 7.4.3.41 through 7.4.3.52, and Liferay DXP 7.4 update 41 through 52 allow remote attackers to inject arbitrary web script or HTML via the (1) code, or (2) error parameter.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.4.3.41
Create a notification for this product.
   Liferay DXP Version: 7.4.13.u41
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:54:13.782Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33941"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-33941",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-22T15:47:35.864239Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-22T15:52:26.805Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.52",
              "status": "affected",
              "version": "7.4.3.41",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.13.u52",
              "status": "affected",
              "version": "7.4.13.u41",
              "versionType": "maven"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Multiple cross-site scripting (XSS) vulnerabilities in the Plugin for OAuth 2.0 module\u0027s OAuth2ProviderApplicationRedirect class in Liferay Portal 7.4.3.41 through 7.4.3.52, and Liferay DXP 7.4 update 41 through 52 allow remote attackers to inject arbitrary web script or HTML via the (1) code, or (2) error parameter."
            }
          ],
          "value": "Multiple cross-site scripting (XSS) vulnerabilities in the Plugin for OAuth 2.0 module\u0027s OAuth2ProviderApplicationRedirect class in Liferay Portal 7.4.3.41 through 7.4.3.52, and Liferay DXP 7.4 update 41 through 52 allow remote attackers to inject arbitrary web script or HTML via the (1) code, or (2) error parameter."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-24T14:36:07.977Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33941"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2023-33941",
    "datePublished": "2023-05-24T14:36:07.977Z",
    "dateReserved": "2023-05-24T02:36:00.163Z",
    "dateUpdated": "2024-10-22T15:52:26.805Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-47795
Vulnerability from cvelistv5
Published
2024-02-21 14:01
Modified
2024-08-02 21:16
Severity ?
Summary
Stored cross-site scripting (XSS) vulnerability in the Document and Media widget in Liferay Portal 7.4.3.18 through 7.4.3.101, and Liferay DXP 2023.Q3 before patch 6, and 7.4 update 18 through 92 allows remote authenticated users to inject arbitrary web script or HTML via a crafted payload injected into a document's “Title” text field.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.4.3.18
Create a notification for this product.
   Liferay DXP Version: 2023.q3.1
Version: 7.4.13.u18
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-47795",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-21T18:14:14.835953Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-05T17:20:59.522Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T21:16:43.666Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-47795"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.101",
              "status": "affected",
              "version": "7.4.3.18",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "2023.q3.5",
              "status": "affected",
              "version": "2023.q3.1",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.4.13.u92",
              "status": "affected",
              "version": "7.4.13.u18",
              "versionType": "maven"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Erwin Krazek"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Stored cross-site scripting (XSS) vulnerability in the Document and Media widget in Liferay Portal 7.4.3.18 through 7.4.3.101, and Liferay DXP 2023.Q3 before patch 6, and 7.4 update 18 through 92 allows remote authenticated users to inject arbitrary web script or HTML via a crafted payload injected into a document\u0027s \u201cTitle\u201d text field."
            }
          ],
          "value": "Stored cross-site scripting (XSS) vulnerability in the Document and Media widget in Liferay Portal 7.4.3.18 through 7.4.3.101, and Liferay DXP 2023.Q3 before patch 6, and 7.4 update 18 through 92 allows remote authenticated users to inject arbitrary web script or HTML via a crafted payload injected into a document\u0027s \u201cTitle\u201d text field."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-21T14:01:00.773Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-47795"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2023-47795",
    "datePublished": "2024-02-21T14:01:00.773Z",
    "dateReserved": "2023-11-10T01:49:20.188Z",
    "dateUpdated": "2024-08-02T21:16:43.666Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-25610
Vulnerability from cvelistv5
Published
2024-02-20 12:42
Modified
2024-08-28 13:37
Severity ?
Summary
In Liferay Portal 7.2.0 through 7.4.3.12, and older unsupported versions, and Liferay DXP 7.4 before update 9, 7.3 before update 4, 7.2 before fix pack 19, and older unsupported versions, the default configuration does not sanitize blog entries of JavaScript, which allows remote authenticated users to inject arbitrary web script or HTML (XSS) via a crafted payload injected into a blog entry’s content text field.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.2.0
Create a notification for this product.
   Liferay DXP Version: 7.4.13
Version: 7.3.10
Version: 7.2.10
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T23:44:09.718Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25610"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:liferay:portal:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "portal",
            "vendor": "liferay",
            "versions": [
              {
                "lessThanOrEqual": "7.4.3.12",
                "status": "affected",
                "version": "7.2.0",
                "versionType": "maven"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "digital_experience_platform",
            "vendor": "liferay",
            "versions": [
              {
                "lessThanOrEqual": "7.2.10-dxp-18",
                "status": "affected",
                "version": "7.2.10",
                "versionType": "maven"
              },
              {
                "lessThanOrEqual": "7.3.10-dxp-3",
                "status": "affected",
                "version": "7.3.10",
                "versionType": "maven"
              },
              {
                "lessThanOrEqual": "7.4.13.u8",
                "status": "affected",
                "version": "7.4.13",
                "versionType": "maven"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-25610",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-28T13:32:33.811894Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-28T13:37:03.603Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.12",
              "status": "affected",
              "version": "7.2.0",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.13.u8",
              "status": "affected",
              "version": "7.4.13",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.3.10-dxp-3",
              "status": "affected",
              "version": "7.3.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.2.10-dxp-18",
              "status": "affected",
              "version": "7.2.10",
              "versionType": "maven"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "In Liferay Portal 7.2.0 through 7.4.3.12, and older unsupported versions, and Liferay DXP 7.4 before update 9, 7.3 before update 4, 7.2 before fix pack 19, and older unsupported versions, the default configuration does not sanitize blog entries of JavaScript, which allows remote authenticated users to inject arbitrary web script or HTML (XSS) via a crafted payload injected into a blog entry\u2019s content text field."
            }
          ],
          "value": "In Liferay Portal 7.2.0 through 7.4.3.12, and older unsupported versions, and Liferay DXP 7.4 before update 9, 7.3 before update 4, 7.2 before fix pack 19, and older unsupported versions, the default configuration does not sanitize blog entries of JavaScript, which allows remote authenticated users to inject arbitrary web script or HTML (XSS) via a crafted payload injected into a blog entry\u2019s content text field."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1188",
              "description": "CWE-1188 Insecure Default Initialization of Resource",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-20T12:42:46.027Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25610"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2024-25610",
    "datePublished": "2024-02-20T12:42:46.027Z",
    "dateReserved": "2024-02-08T13:57:11.426Z",
    "dateUpdated": "2024-08-28T13:37:03.603Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-38269
Vulnerability from cvelistv5
Published
2022-03-02 23:25
Modified
2024-08-04 01:37
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Gogo Shell module in Liferay Portal 7.1.0 through 7.3.6 and 7.4.0, and Liferay DXP 7.1 before fix pack 23, 7.2 before fix pack 13, and 7.3 before fix pack 2 allows remote attackers to inject arbitrary web script or HTML via the output of a Gogo Shell command.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T01:37:16.197Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://liferay.com"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38269-stored-xss-with-gogo-shell-output"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the Gogo Shell module in Liferay Portal 7.1.0 through 7.3.6 and 7.4.0, and Liferay DXP 7.1 before fix pack 23, 7.2 before fix pack 13, and 7.3 before fix pack 2 allows remote attackers to inject arbitrary web script or HTML via the output of a Gogo Shell command."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-19T15:21:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://liferay.com"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38269-stored-xss-with-gogo-shell-output"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-38269",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the Gogo Shell module in Liferay Portal 7.1.0 through 7.3.6 and 7.4.0, and Liferay DXP 7.1 before fix pack 23, 7.2 before fix pack 13, and 7.3 before fix pack 2 allows remote attackers to inject arbitrary web script or HTML via the output of a Gogo Shell command."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://liferay.com",
              "refsource": "MISC",
              "url": "http://liferay.com"
            },
            {
              "name": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38269-stored-xss-with-gogo-shell-output",
              "refsource": "MISC",
              "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38269-stored-xss-with-gogo-shell-output"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-38269",
    "datePublished": "2022-03-02T23:25:56",
    "dateReserved": "2021-08-09T00:00:00",
    "dateUpdated": "2024-08-04T01:37:16.197Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-33938
Vulnerability from cvelistv5
Published
2023-05-24 13:20
Modified
2024-10-22 15:52
Summary
Cross-site scripting (XSS) vulnerability in the App Builder module's custom object details page in Liferay Portal 7.3.0 through 7.4.0, and Liferay DXP 7.3 before update 14 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into an App Builder custom object's `Name` field.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:54:13.714Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33938"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-33938",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-22T15:46:09.421886Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-22T15:52:48.350Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.0",
              "status": "affected",
              "version": "7.3.0",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.3.10.u13",
              "status": "affected",
              "version": "7.3.10",
              "versionType": "maven"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Cross-site scripting (XSS) vulnerability in the App Builder module\u0027s custom object details page in Liferay Portal 7.3.0 through 7.4.0, and Liferay DXP 7.3 before update 14 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into an App Builder custom object\u0027s `Name` field."
            }
          ],
          "value": "Cross-site scripting (XSS) vulnerability in the App Builder module\u0027s custom object details page in Liferay Portal 7.3.0 through 7.4.0, and Liferay DXP 7.3 before update 14 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into an App Builder custom object\u0027s `Name` field."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-24T13:20:19.626Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33938"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2023-33938",
    "datePublished": "2023-05-24T13:20:19.626Z",
    "dateReserved": "2023-05-24T02:36:00.163Z",
    "dateUpdated": "2024-10-22T15:52:48.350Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-38267
Vulnerability from cvelistv5
Published
2022-03-02 23:15
Modified
2024-08-04 01:37
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Blogs module's edit blog entry page in Liferay Portal 7.3.2 through 7.3.6, and Liferay DXP 7.3 before fix pack 2 allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_blogs_web_portlet_BlogsAdminPortlet_title and _com_liferay_blogs_web_portlet_BlogsAdminPortlet_subtitle parameter.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T01:37:16.403Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://liferay.com"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38267-stored-xss-with-title-and-subtitle-of-blog-entry"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the Blogs module\u0027s edit blog entry page in Liferay Portal 7.3.2 through 7.3.6, and Liferay DXP 7.3 before fix pack 2 allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_blogs_web_portlet_BlogsAdminPortlet_title and _com_liferay_blogs_web_portlet_BlogsAdminPortlet_subtitle parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-19T13:23:31",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://liferay.com"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38267-stored-xss-with-title-and-subtitle-of-blog-entry"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-38267",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the Blogs module\u0027s edit blog entry page in Liferay Portal 7.3.2 through 7.3.6, and Liferay DXP 7.3 before fix pack 2 allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_blogs_web_portlet_BlogsAdminPortlet_title and _com_liferay_blogs_web_portlet_BlogsAdminPortlet_subtitle parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://liferay.com",
              "refsource": "MISC",
              "url": "http://liferay.com"
            },
            {
              "name": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38267-stored-xss-with-title-and-subtitle-of-blog-entry",
              "refsource": "MISC",
              "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38267-stored-xss-with-title-and-subtitle-of-blog-entry"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-38267",
    "datePublished": "2022-03-02T23:15:45",
    "dateReserved": "2021-08-09T00:00:00",
    "dateUpdated": "2024-08-04T01:37:16.403Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-25150
Vulnerability from cvelistv5
Published
2024-02-20 08:11
Modified
2024-08-01 23:36
Summary
Information disclosure vulnerability in the Control Panel in Liferay Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before update 4, 7.2 before fix pack 19, and older unsupported versions allows remote authenticated users to obtain a user's full name from the page's title by enumerating user screen names.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.2.0
Create a notification for this product.
   Liferay DXP Version: 7.3.10
Version: 7.2.10
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-25150",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-20T14:56:08.054595Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-05T17:20:56.883Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T23:36:21.623Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25150"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.2",
              "status": "affected",
              "version": "7.2.0",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.3.10-dxp-3",
              "status": "affected",
              "version": "7.3.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.2.10-dxp-18",
              "status": "affected",
              "version": "7.2.10",
              "versionType": "maven"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Sahil Mehra"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Information disclosure vulnerability in the Control Panel in Liferay Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before update 4, 7.2 before fix pack 19, and older unsupported versions allows remote authenticated users to obtain a user\u0027s full name from the page\u0027s title by enumerating user screen names."
            }
          ],
          "value": "Information disclosure vulnerability in the Control Panel in Liferay Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before update 4, 7.2 before fix pack 19, and older unsupported versions allows remote authenticated users to obtain a user\u0027s full name from the page\u0027s title by enumerating user screen names."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-201",
              "description": "CWE-201 Insertion of Sensitive Information Into Sent Data",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-20T08:11:28.312Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25150"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2024-25150",
    "datePublished": "2024-02-20T08:11:28.312Z",
    "dateReserved": "2024-02-06T10:32:42.567Z",
    "dateUpdated": "2024-08-01T23:36:21.623Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-40191
Vulnerability from cvelistv5
Published
2024-02-21 03:06
Modified
2024-08-02 18:24
Severity ?
Summary
Reflected cross-site scripting (XSS) vulnerability in the instance settings for Accounts in Liferay Portal 7.4.3.44 through 7.4.3.97, and Liferay DXP 2023.Q3 before patch 6, and 7.4 update 44 through 92 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into the “Blocked Email Domains” text field
Impacted products
Vendor Product Version
Liferay Portal Version: 7.4.3.44
Create a notification for this product.
   Liferay DXP Version: 2023.q3.1
Version: 7.4.13.u44
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-40191",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-21T16:04:15.992539Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-05T17:21:49.977Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T18:24:55.603Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-40191"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.97",
              "status": "affected",
              "version": "7.4.3.44",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "2023.q3.5",
              "status": "affected",
              "version": "2023.q3.1",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.4.13.u92",
              "status": "affected",
              "version": "7.4.13.u44",
              "versionType": "maven"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Amin ACHOUR"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Reflected cross-site scripting (XSS) vulnerability in the instance settings for Accounts in Liferay Portal 7.4.3.44 through 7.4.3.97, and Liferay DXP 2023.Q3 before patch 6, and 7.4 update 44 through 92 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into the \u201cBlocked Email Domains\u201d text field"
            }
          ],
          "value": "Reflected cross-site scripting (XSS) vulnerability in the instance settings for Accounts in Liferay Portal 7.4.3.44 through 7.4.3.97, and Liferay DXP 2023.Q3 before patch 6, and 7.4 update 44 through 92 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into the \u201cBlocked Email Domains\u201d text field"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-21T03:06:30.224Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-40191"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2023-40191",
    "datePublished": "2024-02-21T03:06:30.224Z",
    "dateReserved": "2023-08-10T07:17:26.967Z",
    "dateUpdated": "2024-08-02T18:24:55.603Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-25151
Vulnerability from cvelistv5
Published
2024-02-21 03:17
Modified
2024-08-01 23:36
Summary
The Calendar module in Liferay Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 15, and older unsupported versions does not escape user supplied data in the default notification email template, which allows remote authenticated users to inject arbitrary web script or HTML via the title of a calendar event or the user's name. This may lead to a content spoofing or cross-site scripting (XSS) attacks depending on the capability of the receiver's mail client.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.2.0
Create a notification for this product.
   Liferay DXP Version: 7.3.10
Version: 7.2.10
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-25151",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-21T19:59:16.285131Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-05T17:21:00.161Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T23:36:21.643Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25151"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.2",
              "status": "affected",
              "version": "7.2.0",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.3.10-dxp-2",
              "status": "affected",
              "version": "7.3.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.2.10-dxp-14",
              "status": "affected",
              "version": "7.2.10",
              "versionType": "maven"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The Calendar module in Liferay Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 15, and older unsupported versions does not escape user supplied data in the default notification email template, which allows remote authenticated users to inject arbitrary web script or HTML via the title of a calendar event or the user\u0027s name. This may lead to a content spoofing or cross-site scripting (XSS) attacks depending on the capability of the receiver\u0027s mail client."
            }
          ],
          "value": "The Calendar module in Liferay Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 15, and older unsupported versions does not escape user supplied data in the default notification email template, which allows remote authenticated users to inject arbitrary web script or HTML via the title of a calendar event or the user\u0027s name. This may lead to a content spoofing or cross-site scripting (XSS) attacks depending on the capability of the receiver\u0027s mail client."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-21T03:17:37.167Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25151"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2024-25151",
    "datePublished": "2024-02-21T03:17:37.167Z",
    "dateReserved": "2024-02-06T10:32:42.567Z",
    "dateUpdated": "2024-08-01T23:36:21.643Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-42123
Vulnerability from cvelistv5
Published
2022-11-15 00:00
Modified
2024-08-03 13:03
Severity ?
Summary
A Zip slip vulnerability in the Elasticsearch Connector in Liferay Portal 7.3.3 through 7.4.3.18, and Liferay DXP 7.3 before update 6, and 7.4 before update 19 allows attackers to create or overwrite existing files on the filesystem via the installation of a malicious Elasticsearch Sidecar plugin.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T13:03:45.528Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://liferay.com"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42123"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://issues.liferay.com/browse/LPE-17518"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A Zip slip vulnerability in the Elasticsearch Connector in Liferay Portal 7.3.3 through 7.4.3.18, and Liferay DXP 7.3 before update 6, and 7.4 before update 19 allows attackers to create or overwrite existing files on the filesystem via the installation of a malicious Elasticsearch Sidecar plugin."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-15T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "http://liferay.com"
        },
        {
          "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42123"
        },
        {
          "url": "https://issues.liferay.com/browse/LPE-17518"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-42123",
    "datePublished": "2022-11-15T00:00:00",
    "dateReserved": "2022-10-03T00:00:00",
    "dateUpdated": "2024-08-03T13:03:45.528Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-26265
Vulnerability from cvelistv5
Published
2024-02-20 12:51
Modified
2024-10-02 15:35
Summary
The Image Uploader module in Liferay Portal 7.2.0 through 7.4.3.15, and older unsupported versions, and Liferay DXP 7.4 before update 16, 7.3 before update 4, 7.2 before fix pack 19, and older unsupported versions relies on a request parameter to limit the size of files that can be uploaded, which allows remote authenticated users to upload arbitrarily large files to the system's temp folder by modifying the `maxFileSize` parameter.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.2.0
Create a notification for this product.
   Liferay DXP Version: 7.4.13
Version: 7.3.10
Version: 7.2.10
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-26265",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-21T19:41:28.464221Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:48:44.628Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T00:07:17.892Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-26265"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.15",
              "status": "affected",
              "version": "7.2.0",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.13.u15",
              "status": "affected",
              "version": "7.4.13",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.3.10-dxp-3",
              "status": "affected",
              "version": "7.3.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.2.10-dxp-18",
              "status": "affected",
              "version": "7.2.10",
              "versionType": "maven"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The Image Uploader module in Liferay Portal 7.2.0 through 7.4.3.15, and older unsupported versions, and Liferay DXP 7.4 before update 16, 7.3 before update 4, 7.2 before fix pack 19, and older unsupported versions relies on a request parameter to limit the size of files that can be uploaded, which allows remote authenticated users to upload arbitrarily large files to the system\u0027s temp folder by modifying the `maxFileSize` parameter."
            }
          ],
          "value": "The Image Uploader module in Liferay Portal 7.2.0 through 7.4.3.15, and older unsupported versions, and Liferay DXP 7.4 before update 16, 7.3 before update 4, 7.2 before fix pack 19, and older unsupported versions relies on a request parameter to limit the size of files that can be uploaded, which allows remote authenticated users to upload arbitrarily large files to the system\u0027s temp folder by modifying the `maxFileSize` parameter."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-770",
              "description": "CWE-770 Allocation of Resources Without Limits or Throttling",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-02T15:35:51.464Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-26265"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2024-26265",
    "datePublished": "2024-02-20T12:51:48.261Z",
    "dateReserved": "2024-02-15T07:44:36.776Z",
    "dateUpdated": "2024-10-02T15:35:51.464Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-44309
Vulnerability from cvelistv5
Published
2023-10-17 08:23
Modified
2024-09-13 16:31
Severity ?
Summary
Multiple stored cross-site scripting (XSS) vulnerabilities in the fragment components in Liferay Portal 7.4.2 through 7.4.3.53, and Liferay DXP 7.4 before update 54 allow remote attackers to inject arbitrary web script or HTML via a crafted payload injected into any non-HTML field of a linked source asset.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T19:59:51.992Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-44309"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-44309",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-13T16:31:32.979058Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-13T16:31:44.348Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.13.u53",
              "status": "affected",
              "version": "7.4.13",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.53",
              "status": "affected",
              "version": "7.4.2",
              "versionType": "maven"
            }
          ]
        }
      ],
      "datePublic": "2023-10-17T07:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Multiple stored cross-site scripting (XSS) vulnerabilities in the fragment components in Liferay Portal 7.4.2 through 7.4.3.53, and Liferay DXP 7.4 before update 54 allow remote attackers to inject arbitrary web script or HTML via a crafted payload injected into any non-HTML field of a linked source asset."
            }
          ],
          "value": "Multiple stored cross-site scripting (XSS) vulnerabilities in the fragment components in Liferay Portal 7.4.2 through 7.4.3.53, and Liferay DXP 7.4 before update 54 allow remote attackers to inject arbitrary web script or HTML via a crafted payload injected into any non-HTML field of a linked source asset."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-17T08:23:27.403Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-44309"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2023-44309",
    "datePublished": "2023-10-17T08:23:27.403Z",
    "dateReserved": "2023-09-28T11:23:54.829Z",
    "dateUpdated": "2024-09-13T16:31:44.348Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-42131
Vulnerability from cvelistv5
Published
2022-11-15 00:00
Modified
2024-08-03 13:03
Severity ?
Summary
Certain Liferay products are affected by: Missing SSL Certificate Validation in the Dynamic Data Mapping module's REST data providers. This affects Liferay Portal 7.1.0 through 7.4.2 and Liferay DXP 7.1 before fix pack 27, 7.2 before fix pack 17, and 7.3 before service pack 3.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T13:03:45.399Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://liferay.com"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42131"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://issues.liferay.com/browse/LPE-17377"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Certain Liferay products are affected by: Missing SSL Certificate Validation in the Dynamic Data Mapping module\u0027s REST data providers. This affects Liferay Portal 7.1.0 through 7.4.2 and Liferay DXP 7.1 before fix pack 27, 7.2 before fix pack 17, and 7.3 before service pack 3."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-15T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "http://liferay.com"
        },
        {
          "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42131"
        },
        {
          "url": "https://issues.liferay.com/browse/LPE-17377"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-42131",
    "datePublished": "2022-11-15T00:00:00",
    "dateReserved": "2022-10-03T00:00:00",
    "dateUpdated": "2024-08-03T13:03:45.399Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-42125
Vulnerability from cvelistv5
Published
2022-11-15 00:00
Modified
2024-08-03 13:03
Severity ?
Summary
Zip slip vulnerability in FileUtil.unzip in Liferay Portal 7.4.3.5 through 7.4.3.35 and Liferay DXP 7.4 update 1 through update 34 allows attackers to create or overwrite existing files on the filesystem via the deployment of a malicious plugin/module.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T13:03:45.614Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://liferay.com"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42125"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://issues.liferay.com/browse/LPE-17517"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Zip slip vulnerability in FileUtil.unzip in Liferay Portal 7.4.3.5 through 7.4.3.35 and Liferay DXP 7.4 update 1 through update 34 allows attackers to create or overwrite existing files on the filesystem via the deployment of a malicious plugin/module."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-15T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "http://liferay.com"
        },
        {
          "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42125"
        },
        {
          "url": "https://issues.liferay.com/browse/LPE-17517"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-42125",
    "datePublished": "2022-11-15T00:00:00",
    "dateReserved": "2022-10-03T00:00:00",
    "dateUpdated": "2024-08-03T13:03:45.614Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-38265
Vulnerability from cvelistv5
Published
2022-03-02 23:03
Modified
2024-08-04 01:37
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Asset module in Liferay Portal 7.3.4 through 7.3.6 allow remote attackers to inject arbitrary web script or HTML when creating a collection page via the _com_liferay_asset_list_web_portlet_AssetListPortlet_title parameter.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T01:37:16.335Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://liferay.com"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38265-stored-xss-with-collection-name"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the Asset module in Liferay Portal 7.3.4 through 7.3.6 allow remote attackers to inject arbitrary web script or HTML when creating a collection page via the _com_liferay_asset_list_web_portlet_AssetListPortlet_title parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-20T19:50:41",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://liferay.com"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38265-stored-xss-with-collection-name"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-38265",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the Asset module in Liferay Portal 7.3.4 through 7.3.6 allow remote attackers to inject arbitrary web script or HTML when creating a collection page via the _com_liferay_asset_list_web_portlet_AssetListPortlet_title parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://liferay.com",
              "refsource": "MISC",
              "url": "http://liferay.com"
            },
            {
              "name": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38265-stored-xss-with-collection-name",
              "refsource": "MISC",
              "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38265-stored-xss-with-collection-name"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-38265",
    "datePublished": "2022-03-02T23:03:31",
    "dateReserved": "2021-08-09T00:00:00",
    "dateUpdated": "2024-08-04T01:37:16.335Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-25605
Vulnerability from cvelistv5
Published
2024-02-20 08:51
Modified
2024-08-01 23:44
Summary
The Journal module in Liferay Portal 7.2.0 through 7.4.3.4, and older unsupported versions, and Liferay DXP 7.4.13, 7.3 before service pack 3, 7.2 before fix pack 17, and older unsupported versions grants guest users view permission to web content templates by default, which allows remote attackers to view any template via the UI or API.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.2.0
Create a notification for this product.
   Liferay DXP Version: 7.4.13
Version: 7.3.10
Version: 7.2.10
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:liferay:portal:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "portal",
            "vendor": "liferay",
            "versions": [
              {
                "lessThanOrEqual": "7.4.3.4",
                "status": "affected",
                "version": "7.2.0",
                "versionType": "maven"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:liferay:dxp:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "dxp",
            "vendor": "liferay",
            "versions": [
              {
                "status": "affected",
                "version": "7.4.13"
              },
              {
                "lessThanOrEqual": "7.3.10-dxp-2",
                "status": "affected",
                "version": "7.3.10",
                "versionType": "maven"
              },
              {
                "lessThanOrEqual": "7.2.10 \u003c= 7.2.10-dxp-16",
                "status": "affected",
                "version": "7.2.10",
                "versionType": "maven"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-25605",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-20T16:21:08.731302Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-29T15:14:35.486Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T23:44:09.695Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25605"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.4",
              "status": "affected",
              "version": "7.2.0",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "status": "affected",
              "version": "7.4.13"
            },
            {
              "lessThanOrEqual": "7.3.10-dxp-2",
              "status": "affected",
              "version": "7.3.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.2.10-dxp-16",
              "status": "affected",
              "version": "7.2.10",
              "versionType": "maven"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The Journal module in Liferay Portal 7.2.0 through 7.4.3.4, and older unsupported versions, and Liferay DXP 7.4.13, 7.3 before service pack 3, 7.2 before fix pack 17, and older unsupported versions grants guest users view permission to web content templates by default, which allows remote attackers to view any template via the UI or API."
            }
          ],
          "value": "The Journal module in Liferay Portal 7.2.0 through 7.4.3.4, and older unsupported versions, and Liferay DXP 7.4.13, 7.3 before service pack 3, 7.2 before fix pack 17, and older unsupported versions grants guest users view permission to web content templates by default, which allows remote attackers to view any template via the UI or API."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-276",
              "description": "CWE-276 Incorrect Default Permissions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-20T08:51:32.953Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25605"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2024-25605",
    "datePublished": "2024-02-20T08:51:32.953Z",
    "dateReserved": "2024-02-08T13:57:11.425Z",
    "dateUpdated": "2024-08-01T23:44:09.695Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-33945
Vulnerability from cvelistv5
Published
2023-05-24 15:22
Modified
2024-10-22 15:51
Summary
SQL injection vulnerability in the upgrade process for SQL Server in Liferay Portal 7.3.1 through 7.4.3.17, and Liferay DXP 7.3 before update 6, and 7.4 before update 18 allows attackers to execute arbitrary SQL commands via the name of a database table's primary key index. This vulnerability is only exploitable when chained with other attacks. To exploit this vulnerability, the attacker must modify the database and wait for the application to be upgraded.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.3.1
Create a notification for this product.
   Liferay DXP Version: 7.3.10
Version: 7.4.13
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:54:13.406Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33945"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-33945",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-22T15:49:11.404495Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-22T15:51:59.026Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.17",
              "status": "affected",
              "version": "7.3.1",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.3.10.u5",
              "status": "affected",
              "version": "7.3.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.4.13.u17",
              "status": "affected",
              "version": "7.4.13",
              "versionType": "maven"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "SQL injection vulnerability in the upgrade process for SQL Server in Liferay Portal 7.3.1 through 7.4.3.17, and Liferay DXP 7.3 before update 6, and 7.4 before update 18 allows attackers to execute arbitrary SQL commands via the name of a database table\u0027s primary key index. This vulnerability is only exploitable when chained with other attacks. To exploit this vulnerability, the attacker must modify the database and wait for the application to be upgraded."
            }
          ],
          "value": "SQL injection vulnerability in the upgrade process for SQL Server in Liferay Portal 7.3.1 through 7.4.3.17, and Liferay DXP 7.3 before update 6, and 7.4 before update 18 allows attackers to execute arbitrary SQL commands via the name of a database table\u0027s primary key index. This vulnerability is only exploitable when chained with other attacks. To exploit this vulnerability, the attacker must modify the database and wait for the application to be upgraded."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-89",
              "description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-24T15:22:39.081Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33945"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2023-33945",
    "datePublished": "2023-05-24T15:22:39.081Z",
    "dateReserved": "2023-05-24T02:36:00.164Z",
    "dateUpdated": "2024-10-22T15:51:59.026Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-33946
Vulnerability from cvelistv5
Published
2023-05-24 15:28
Modified
2024-10-22 15:51
Summary
The Object module in Liferay Portal 7.4.3.4 through 7.4.3.48, and Liferay DXP 7.4 before update 49 does properly isolate objects in difference virtual instances, which allows remote authenticated users in one virtual instance to view objects in a different virtual instance via OAuth 2 scope administration page.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:54:13.397Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33946"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-33946",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-22T15:44:36.680172Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-22T15:51:52.390Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.48",
              "status": "affected",
              "version": "7.4.3.4",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.13.u48",
              "status": "affected",
              "version": "7.4.13",
              "versionType": "maven"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The Object module in Liferay Portal 7.4.3.4 through 7.4.3.48, and Liferay DXP 7.4 before update 49 does properly isolate objects in difference virtual instances, which allows remote authenticated users in one virtual instance to view objects in a different virtual instance via OAuth 2 scope administration page."
            }
          ],
          "value": "The Object module in Liferay Portal 7.4.3.4 through 7.4.3.48, and Liferay DXP 7.4 before update 49 does properly isolate objects in difference virtual instances, which allows remote authenticated users in one virtual instance to view objects in a different virtual instance via OAuth 2 scope administration page."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 2.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-284",
              "description": "CWE-284 Improper Access Control",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-24T15:28:28.713Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33946"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2023-33946",
    "datePublished": "2023-05-24T15:28:28.713Z",
    "dateReserved": "2023-05-24T02:36:00.165Z",
    "dateUpdated": "2024-10-22T15:51:52.390Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-26270
Vulnerability from cvelistv5
Published
2024-02-20 13:43
Modified
2024-08-16 19:55
Summary
The Account Settings page in Liferay Portal 7.4.3.76 through 7.4.3.99, and Liferay DXP 2023.Q3 before patch 5, and 7.4 update 76 through 92 embeds the user’s hashed password in the page’s HTML source, which allows man-in-the-middle attackers to steal a user's hashed password.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.4.3.76
Create a notification for this product.
   Liferay DXP Version: 2023.q3.1
Version: 7.4.13.u76
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T00:07:19.056Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-26270"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-26270",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-16T19:55:04.883437Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-16T19:55:12.801Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.99",
              "status": "affected",
              "version": "7.4.3.76",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "2023.q3.4",
              "status": "affected",
              "version": "2023.q3.1",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.4.13.u92",
              "status": "affected",
              "version": "7.4.13.u76",
              "versionType": "maven"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The Account Settings page in Liferay Portal 7.4.3.76 through 7.4.3.99, and Liferay DXP 2023.Q3 before patch 5, and 7.4 update 76 through 92 embeds the user\u2019s hashed password in the page\u2019s HTML source, which allows man-in-the-middle attackers to steal a user\u0027s hashed password."
            }
          ],
          "value": "The Account Settings page in Liferay Portal 7.4.3.76 through 7.4.3.99, and Liferay DXP 2023.Q3 before patch 5, and 7.4 update 76 through 92 embeds the user\u2019s hashed password in the page\u2019s HTML source, which allows man-in-the-middle attackers to steal a user\u0027s hashed password."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-201",
              "description": "CWE-201 Insertion of Sensitive Information Into Sent Data",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-20T13:43:46.074Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-26270"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2024-26270",
    "datePublished": "2024-02-20T13:43:46.074Z",
    "dateReserved": "2024-02-15T07:44:36.776Z",
    "dateUpdated": "2024-08-16T19:55:12.801Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-33937
Vulnerability from cvelistv5
Published
2023-05-24 12:16
Modified
2024-10-22 15:52
Summary
Stored cross-site scripting (XSS) vulnerability in Form widget configuration in Liferay Portal 7.1.0 through 7.3.0, and Liferay DXP 7.1 before fix pack 18, and 7.2 before fix pack 5 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a form's `name` field.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.1.0
Create a notification for this product.
   Liferay DXP Version: 7.1.10
Version: 7.2.10
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:54:13.972Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33937"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-33937",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-22T15:46:27.983047Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-22T15:52:55.857Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.3.0",
              "status": "affected",
              "version": "7.1.0",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.1.10-dxp-17",
              "status": "affected",
              "version": "7.1.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.2.10-dxp-4",
              "status": "affected",
              "version": "7.2.10",
              "versionType": "maven"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Stored cross-site scripting (XSS) vulnerability in Form widget configuration in Liferay Portal 7.1.0 through 7.3.0, and Liferay DXP 7.1 before fix pack 18, and 7.2 before fix pack 5 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a form\u0027s `name` field."
            }
          ],
          "value": "Stored cross-site scripting (XSS) vulnerability in Form widget configuration in Liferay Portal 7.1.0 through 7.3.0, and Liferay DXP 7.1 before fix pack 18, and 7.2 before fix pack 5 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a form\u0027s `name` field."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-24T12:16:36.342Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33937"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2023-33937",
    "datePublished": "2023-05-24T12:16:36.342Z",
    "dateReserved": "2023-05-24T02:36:00.162Z",
    "dateUpdated": "2024-10-22T15:52:55.857Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-42629
Vulnerability from cvelistv5
Published
2023-10-17 08:13
Modified
2024-08-02 19:23
Severity ?
Summary
Stored cross-site scripting (XSS) vulnerability in the manage vocabulary page in Liferay Portal 7.4.2 through 7.4.3.87, and Liferay DXP 7.4 before update 88 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a Vocabulary's 'description' text field.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T19:23:40.057Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-42629"
          },
          {
            "tags": [
              "exploit",
              "third-party-advisory",
              "x_transferred"
            ],
            "url": "https://www.pentagrid.ch/en/blog/stored-cross-site-scripting-vulnerabilities-in-liferay-portal/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.13.u87",
              "status": "affected",
              "version": "7.4.13",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.87",
              "status": "affected",
              "version": "7.4.2",
              "versionType": "maven"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Michael Oelke"
        }
      ],
      "datePublic": "2023-10-17T07:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Stored cross-site scripting (XSS) vulnerability in the manage vocabulary page in Liferay Portal 7.4.2 through 7.4.3.87, and Liferay DXP 7.4 before update 88 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a Vocabulary\u0027s \u0027description\u0027 text field."
            }
          ],
          "value": "Stored cross-site scripting (XSS) vulnerability in the manage vocabulary page in Liferay Portal 7.4.2 through 7.4.3.87, and Liferay DXP 7.4 before update 88 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a Vocabulary\u0027s \u0027description\u0027 text field."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-10T02:34:30.191Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-42629"
        },
        {
          "tags": [
            "exploit",
            "third-party-advisory"
          ],
          "url": "https://www.pentagrid.ch/en/blog/stored-cross-site-scripting-vulnerabilities-in-liferay-portal/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2023-42629",
    "datePublished": "2023-10-17T08:13:31.830Z",
    "dateReserved": "2023-09-12T05:35:42.826Z",
    "dateUpdated": "2024-08-02T19:23:40.057Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-42126
Vulnerability from cvelistv5
Published
2022-11-15 00:00
Modified
2024-08-03 13:03
Severity ?
Summary
The Asset Libraries module in Liferay Portal 7.3.5 through 7.4.3.28, and Liferay DXP 7.3 before update 8, and DXP 7.4 before update 29 does not properly check permissions of asset libraries, which allows remote authenticated users to view asset libraries via the UI.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T13:03:45.085Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://liferay.com"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42126"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://issues.liferay.com/browse/LPE-17593"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The Asset Libraries module in Liferay Portal 7.3.5 through 7.4.3.28, and Liferay DXP 7.3 before update 8, and DXP 7.4 before update 29 does not properly check permissions of asset libraries, which allows remote authenticated users to view asset libraries via the UI."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-15T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "http://liferay.com"
        },
        {
          "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42126"
        },
        {
          "url": "https://issues.liferay.com/browse/LPE-17593"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-42126",
    "datePublished": "2022-11-15T00:00:00",
    "dateReserved": "2022-10-03T00:00:00",
    "dateUpdated": "2024-08-03T13:03:45.085Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-25607
Vulnerability from cvelistv5
Published
2024-02-20 09:17
Modified
2024-08-01 23:44
Summary
The default password hashing algorithm (PBKDF2-HMAC-SHA1) in Liferay Portal 7.2.0 through 7.4.3.15, and older unsupported versions, and Liferay DXP 7.4 before update 16, 7.3 before update 4, 7.2 before fix pack 17, and older unsupported versions defaults to a low work factor, which allows attackers to quickly crack password hashes.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.2.0
Create a notification for this product.
   Liferay DXP Version: 7.4.13
Version: 7.3.10
Version: 7.2.10
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:liferay:digital_experience_platform:7.2.10:*:*:*:*:*:*:*",
              "cpe:2.3:a:liferay:digital_experience_platform:7.3.10:*:*:*:*:*:*:*",
              "cpe:2.3:a:liferay:digital_experience_platform:7.4.13:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "digital_experience_platform",
            "vendor": "liferay",
            "versions": [
              {
                "lessThanOrEqual": "7.2.10-dxp-16",
                "status": "affected",
                "version": "7.2.10",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "7.3.10-dxp-3",
                "status": "affected",
                "version": "7.3.10",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "7.4.13.u15",
                "status": "affected",
                "version": "7.4.13",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:liferay:liferay_portal:7.2.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:liferay:liferay_portal:7.3.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:liferay:liferay_portal:7.4.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "liferay_portal",
            "vendor": "liferay",
            "versions": [
              {
                "lessThanOrEqual": "7.2.1",
                "status": "affected",
                "version": "7.2.0",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "7.3.7",
                "status": "affected",
                "version": "7.3.0",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "7.4.3.13",
                "status": "affected",
                "version": "7.4.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-25607",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-20T13:27:04.966342Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-26T19:15:32.185Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T23:44:09.762Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25607"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.15",
              "status": "affected",
              "version": "7.2.0",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.13.u15",
              "status": "affected",
              "version": "7.4.13",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.3.10-dxp-3",
              "status": "affected",
              "version": "7.3.10",
              "versionType": "maven"
            },
            {
              "lessThanOrEqual": "7.2.10-dxp-16",
              "status": "affected",
              "version": "7.2.10",
              "versionType": "maven"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The default password hashing algorithm (PBKDF2-HMAC-SHA1) in Liferay Portal 7.2.0 through 7.4.3.15, and older unsupported versions, and Liferay DXP 7.4 before update 16, 7.3 before update 4, 7.2 before fix pack 17, and older unsupported versions defaults to a low work factor, which allows attackers to quickly crack password hashes."
            }
          ],
          "value": "The default password hashing algorithm (PBKDF2-HMAC-SHA1) in Liferay Portal 7.2.0 through 7.4.3.15, and older unsupported versions, and Liferay DXP 7.4 before update 16, 7.3 before update 4, 7.2 before fix pack 17, and older unsupported versions defaults to a low work factor, which allows attackers to quickly crack password hashes."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-916",
              "description": "CWE-916 Use of Password Hash With Insufficient Computational Effort",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-20T09:17:04.894Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25607"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2024-25607",
    "datePublished": "2024-02-20T09:17:04.894Z",
    "dateReserved": "2024-02-08T13:57:11.425Z",
    "dateUpdated": "2024-08-01T23:44:09.762Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-33943
Vulnerability from cvelistv5
Published
2023-05-24 14:57
Modified
2024-10-22 15:52
Summary
Cross-site scripting (XSS) vulnerability in the Account module in Liferay Portal 7.4.3.21 through 7.4.3.62, and Liferay DXP 7.4 update 21 through 62 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a user's (1) First Name, (2) Middle Name, (3) Last Name, or (4) Job Title text field.
Impacted products
Vendor Product Version
Liferay Portal Version: 7.4.3.21
Create a notification for this product.
   Liferay DXP Version: 7.4.13.u21
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:54:13.419Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33943"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-33943",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-22T15:46:56.420516Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-22T15:52:13.867Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.62",
              "status": "affected",
              "version": "7.4.3.21",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.13.u62",
              "status": "affected",
              "version": "7.4.13.u21",
              "versionType": "maven"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Cross-site scripting (XSS) vulnerability in the Account module in Liferay Portal 7.4.3.21 through 7.4.3.62, and Liferay DXP 7.4 update 21 through 62 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a user\u0027s (1) First Name, (2) Middle Name, (3) Last Name, or (4) Job Title text field."
            }
          ],
          "value": "Cross-site scripting (XSS) vulnerability in the Account module in Liferay Portal 7.4.3.21 through 7.4.3.62, and Liferay DXP 7.4 update 21 through 62 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a user\u0027s (1) First Name, (2) Middle Name, (3) Last Name, or (4) Job Title text field."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-24T14:57:46.177Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33943"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2023-33943",
    "datePublished": "2023-05-24T14:57:46.177Z",
    "dateReserved": "2023-05-24T02:36:00.163Z",
    "dateUpdated": "2024-10-22T15:52:13.867Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-42124
Vulnerability from cvelistv5
Published
2022-11-15 00:00
Modified
2024-08-03 13:03
Severity ?
Summary
ReDoS vulnerability in LayoutPageTemplateEntryUpgradeProcess in Liferay Portal 7.3.2 through 7.4.3.4 and Liferay DXP 7.2 fix pack 9 through fix pack 18, 7.3 before update 4, and DXP 7.4 GA allows remote attackers to consume an excessive amount of server resources via a crafted payload injected into the 'name' field of a layout prototype.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T13:03:45.475Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://liferay.com"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42124"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://issues.liferay.com/browse/LPE-17435"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://issues.liferay.com/browse/LPE-17535"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "ReDoS vulnerability in LayoutPageTemplateEntryUpgradeProcess in Liferay Portal 7.3.2 through 7.4.3.4 and Liferay DXP 7.2 fix pack 9 through fix pack 18, 7.3 before update 4, and DXP 7.4 GA allows remote attackers to consume an excessive amount of server resources via a crafted payload injected into the \u0027name\u0027 field of a layout prototype."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-15T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "http://liferay.com"
        },
        {
          "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42124"
        },
        {
          "url": "https://issues.liferay.com/browse/LPE-17435"
        },
        {
          "url": "https://issues.liferay.com/browse/LPE-17535"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-42124",
    "datePublished": "2022-11-15T00:00:00",
    "dateReserved": "2022-10-03T00:00:00",
    "dateUpdated": "2024-08-03T13:03:45.475Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2024-02-08 03:15
Modified
2024-11-21 08:30
Summary
Account lockout in Liferay Portal 7.2.0 through 7.3.0, and older unsupported versions, and Liferay DXP 7.2 before fix pack 5, and older unsupported versions does not invalidate existing user sessions, which allows remote authenticated users to remain authenticated after an account has been locked.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459",
              "versionEndExcluding": "7.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "219ADF32-211D-463B-8624-C1C521918363",
              "versionEndExcluding": "7.3.0",
              "versionStartIncluding": "7.2.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Account lockout in Liferay Portal 7.2.0 through 7.3.0, and older unsupported versions, and Liferay DXP 7.2 before fix pack 5, and older unsupported versions does not invalidate existing user sessions, which allows remote authenticated users to remain authenticated after an account has been locked."
    },
    {
      "lang": "es",
      "value": "El bloqueo de cuentas en Liferay Portal 7.2.0 a 7.3.0 y versiones anteriores no compatibles, y Liferay DXP 7.2 anterior al fixpack 5 y versiones anteriores no compatibles no invalida las sesiones de usuario existentes, lo que permite a los usuarios autenticados remotamente permanecer autenticados despu\u00e9s de que se haya bloqueado una cuenta."
    }
  ],
  "id": "CVE-2023-47798",
  "lastModified": "2024-11-21T08:30:49.593",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.5,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.6,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.1,
        "impactScore": 2.5,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-08T03:15:07.367",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-47798"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-47798"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-384"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-384"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-20 10:15
Modified
2024-12-11 17:56
Summary
HtmlUtil.escapeRedirect in Liferay Portal 7.2.0 through 7.4.3.18, and older unsupported versions, and Liferay DXP 7.4 before update 19, 7.3 before update 4, 7.2 before fix pack 19, and older unsupported versions can be circumvented by using the 'REPLACEMENT CHARACTER' (U+FFFD), which allows remote attackers to redirect users to arbitrary external URLs via the (1) 'redirect` parameter (2) `FORWARD_URL` parameter, (3) `noSuchEntryRedirect` parameter, and (4) others parameters that rely on HtmlUtil.escapeRedirect.
Impacted products
Vendor Product Version
liferay digital_experience_platform *
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay liferay_portal *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459",
              "versionEndExcluding": "7.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "311EE92A-0EEF-4556-A52F-E6C9522FA2DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "49501C9E-D12A-45E0-92F3-8FD5FDC6D3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_17:*:*:*:*:*:*",
              "matchCriteriaId": "F2B55C77-9FAA-4E14-8CEF-9C4CAC804007",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_18:*:*:*:*:*:*",
              "matchCriteriaId": "54E499E6-C747-476B-BFE2-C04D9F8744F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "43F61E2F-4643-4D5D-84DB-7B7B6E93C67B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "8B057D81-7589-4007-9A0D-2D302B82F9CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "6F0F2558-6990-43D7-9FE2-8E99D81B8269",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "11072673-C3AB-42EA-A26F-890DEE903D42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "134560B0-9746-4EC3-8DE3-26E53E2CAC6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "71E41E59-D71F-48F0-812B-39D59F81997B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "728DF154-F19F-454C-87CA-1E755107F2A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
              "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update10:*:*:*:*:*:*",
              "matchCriteriaId": "C7B02106-D5EA-4A59-A959-CCE2AC8F55BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update11:*:*:*:*:*:*",
              "matchCriteriaId": "80204464-5DC5-4A52-B844-C833A96E6BD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update12:*:*:*:*:*:*",
              "matchCriteriaId": "6F8A5D02-0B45-4DA9-ACD8-42C1BFF62827",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update13:*:*:*:*:*:*",
              "matchCriteriaId": "38DA7C99-AC2C-4B9A-B611-4697159E1D79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update14:*:*:*:*:*:*",
              "matchCriteriaId": "F264AD07-D105-4F00-8920-6D8146E4FA63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update15:*:*:*:*:*:*",
              "matchCriteriaId": "C929CF16-4725-492A-872B-0928FE388FC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update16:*:*:*:*:*:*",
              "matchCriteriaId": "1B8750A1-E481-48D4-84F4-97D1ABE15B46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update17:*:*:*:*:*:*",
              "matchCriteriaId": "454F8410-D9AC-481E-841C-60F0DF2CC25E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update18:*:*:*:*:*:*",
              "matchCriteriaId": "D1A442EE-460F-4823-B9EF-4421050F0847",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update2:*:*:*:*:*:*",
              "matchCriteriaId": "10B863B8-201D-494C-8175-168820996174",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update3:*:*:*:*:*:*",
              "matchCriteriaId": "CBF766CE-CBB8-472A-BAF0-BD39A7BCB4DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update4:*:*:*:*:*:*",
              "matchCriteriaId": "182FAA46-D9FB-4170-B305-BAD0DF6E5DE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update5:*:*:*:*:*:*",
              "matchCriteriaId": "DF1BB9E6-D690-4C12-AEF0-4BD712869CBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update6:*:*:*:*:*:*",
              "matchCriteriaId": "653A0452-070F-4312-B94A-F5BCB01B9BDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update7:*:*:*:*:*:*",
              "matchCriteriaId": "15B67345-D0AF-4BFD-A62D-870F75306A4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update8:*:*:*:*:*:*",
              "matchCriteriaId": "DE1F4262-A054-48CC-BF1D-AA77A94FFFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update9:*:*:*:*:*:*",
              "matchCriteriaId": "D176CECA-2821-49EA-86EC-1184C133C0A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA3FDC34-0257-4B20-85E8-2195965EDD8E",
              "versionEndExcluding": "7.4.3.19",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "HtmlUtil.escapeRedirect in Liferay Portal 7.2.0 through 7.4.3.18, and older unsupported versions, and Liferay DXP 7.4 before update 19, 7.3 before update 4, 7.2 before fix pack 19, and older unsupported versions can be circumvented by using the \u0027REPLACEMENT CHARACTER\u0027 (U+FFFD), which allows remote attackers to redirect users to arbitrary external URLs via the (1) \u0027redirect` parameter (2) `FORWARD_URL` parameter, (3) `noSuchEntryRedirect` parameter, and (4) others parameters that rely on HtmlUtil.escapeRedirect."
    },
    {
      "lang": "es",
      "value": "HtmlUtil.escapeRedirect en Liferay Portal 7.2.0 a 7.4.3.18 y versiones anteriores no compatibles, y Liferay DXP 7.4 antes de la actualizaci\u00f3n 19, 7.3 antes de la actualizaci\u00f3n 4, 7.2 antes del fixpack 19 y versiones anteriores no compatibles se pueden eludir utilizando el \u0027REPLACEMENT CHARACTER\u0027 (U+FFFD), que permite a atacantes remotos redirigir a los usuarios a URL externas arbitrarias a trav\u00e9s del (1) par\u00e1metro \u0027redirect` (2) par\u00e1metro `FORWARD_URL`, (3) par\u00e1metro `noSuchEntryRedirect` y (4) otros par\u00e1metros que dependen de HtmlUtil.escapeRedirect."
    }
  ],
  "id": "CVE-2024-25608",
  "lastModified": "2024-12-11T17:56:22.230",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-20T10:15:08.530",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25608"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25608"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-601"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-601"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-03-03 00:15
Modified
2024-11-21 06:16
Summary
Cross-site scripting (XSS) vulnerability in the Gogo Shell module in Liferay Portal 7.1.0 through 7.3.6 and 7.4.0, and Liferay DXP 7.1 before fix pack 23, 7.2 before fix pack 13, and 7.3 before fix pack 2 allows remote attackers to inject arbitrary web script or HTML via the output of a Gogo Shell command.
Impacted products
Vendor Product Version
liferay liferay_portal *
liferay liferay_portal 7.4.0
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3E59C58-7196-4CA6-A0A1-4DFB5E666C67",
              "versionEndIncluding": "7.3.6",
              "versionStartIncluding": "7.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:7.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D77AE89B-3769-4AEC-AF7B-00AAE3F345F9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "27DF695E-B890-42C2-8941-5BB53154755F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "072F6C59-3D86-48D1-A14E-477FFFA3B1D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "FE68B4A2-3459-4DBA-8BAC-E9AA9FA25264",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "680D7963-1393-4E86-A65F-D4463D532120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "D81E73DD-FD21-4082-A883-34422AE6C024",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "E6DD0451-98EA-4140-8294-77A14F063E2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "CE94E76B-8CC2-4E91-B7A3-EEBCC1358FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "408BD438-E15C-422F-9612-C62A7387FC63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "A78C8B1C-39CB-4C27-B57C-0AF5E7EB50D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_17:*:*:*:*:*:*",
              "matchCriteriaId": "0AB19E97-BACE-4FCC-A53F-078D61A7A9E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_18:*:*:*:*:*:*",
              "matchCriteriaId": "D18ACD28-9182-435C-A30F-DF3BFE13C39A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_19:*:*:*:*:*:*",
              "matchCriteriaId": "CFE4CC72-C15A-40DE-AFF4-0B6B79BFB2BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "386F0E26-78DC-4D59-A20F-B41D0E59561B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_20:*:*:*:*:*:*",
              "matchCriteriaId": "43C11288-1C48-47A0-95DF-A48F3C0285F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_21:*:*:*:*:*:*",
              "matchCriteriaId": "5ECF3B18-D0DB-4FB6-9F6F-B63A6CE45081",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_22:*:*:*:*:*:*",
              "matchCriteriaId": "79AC7C0B-4135-4C24-8D37-A9431156E3E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_23:*:*:*:*:*:*",
              "matchCriteriaId": "7289F71D-ECEB-4FB9-A53F-D3F4D1315ADD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "54576481-2AE9-4133-9EFA-B7FBDCA4427D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "E29CE810-76D5-4283-B102-70344B6C9506",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "DA869467-C560-4130-A180-86819F6A8673",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "CC0C94B7-31FB-4115-8EDE-62CC459B6663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "07DEAA71-53DA-4508-B7E6-924ABED49E66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "467323F6-5CA7-42A0-9810-C6FA694CEC93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "32EFFD8A-1C0D-446B-AAD7-5D23D483D3D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the Gogo Shell module in Liferay Portal 7.1.0 through 7.3.6 and 7.4.0, and Liferay DXP 7.1 before fix pack 23, 7.2 before fix pack 13, and 7.3 before fix pack 2 allows remote attackers to inject arbitrary web script or HTML via the output of a Gogo Shell command."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el m\u00f3dulo Gogo Shell en Liferay Portal 7.1.0 hasta 7.3.6 y 7.4.0, y Liferay DXP 7.1 antes del paquete de correcciones 23, 7.2 antes del paquete de correcciones 13 y 7.3 antes del paquete de correcciones 2 permite a los atacantes remotos inyectar secuencias de comandos web o HTML arbitrarias a trav\u00e9s de la salida de un comando Gogo Shell"
    }
  ],
  "id": "CVE-2021-38269",
  "lastModified": "2024-11-21T06:16:43.007",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-03-03T00:15:08.110",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Product"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38269-stored-xss-with-gogo-shell-output"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Product"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38269-stored-xss-with-gogo-shell-output"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-21 02:15
Modified
2025-01-28 21:26
Summary
Stored cross-site scripting (XSS) vulnerability in Message Board widget in Liferay Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 17, and older unsupported versions allows remote authenticated users to inject arbitrary web script or HTML via the filename of an attachment.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "831BFAEF-E7B6-4E84-9142-79B93FBA0E8A",
              "versionEndExcluding": "7.4.3.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459",
              "versionEndExcluding": "7.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "311EE92A-0EEF-4556-A52F-E6C9522FA2DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "49501C9E-D12A-45E0-92F3-8FD5FDC6D3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "43F61E2F-4643-4D5D-84DB-7B7B6E93C67B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "8B057D81-7589-4007-9A0D-2D302B82F9CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "6F0F2558-6990-43D7-9FE2-8E99D81B8269",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "11072673-C3AB-42EA-A26F-890DEE903D42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "134560B0-9746-4EC3-8DE3-26E53E2CAC6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stored cross-site scripting (XSS) vulnerability in Message Board widget in Liferay Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 17, and older unsupported versions allows remote authenticated users to inject arbitrary web script or HTML via the filename of an attachment."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de Cross-site scripting (XSS) almacenadas en el widget Tablero de mensajes en Liferay Portal 7.2.0 a 7.4.2 y versiones anteriores no compatibles, y Liferay DXP 7.3 anterior al service pack 3, 7.2 anterior al fix pack 17 y versiones anteriores no compatibles permiten acceso remoto usuarios autenticados para inyectar scripts web o HTML arbitrarios a trav\u00e9s del nombre de archivo de un archivo adjunto."
    }
  ],
  "id": "CVE-2024-25152",
  "lastModified": "2025-01-28T21:26:06.277",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.0,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 6.0,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-21T02:15:29.933",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25152"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25152"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-20 06:15
Modified
2025-01-28 21:34
Summary
Open redirect vulnerability in the Countries Management’s edit region page in Liferay Portal 7.4.3.45 through 7.4.3.101, and Liferay DXP 2023.Q3 before patch 6, and 7.4 update 45 through 92 allows remote attackers to redirect users to arbitrary external URLs via the _com_liferay_address_web_internal_portlet_CountriesManagementAdminPortlet_redirect parameter.
Impacted products
Vendor Product Version
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 2023.q3.0
liferay digital_experience_platform 2023.q3.1
liferay digital_experience_platform 2023.q3.2
liferay digital_experience_platform 2023.q3.3
liferay digital_experience_platform 2023.q3.4
liferay digital_experience_platform 2023.q3.5
liferay liferay_portal *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update45:*:*:*:*:*:*",
              "matchCriteriaId": "B921E670-480F-4793-A636-3855A1654908",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update46:*:*:*:*:*:*",
              "matchCriteriaId": "62AE52FE-FB7F-4339-BDDE-E5AD235BBC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update47:*:*:*:*:*:*",
              "matchCriteriaId": "C99508DB-19E9-4832-AB38-57C61C7D68BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update48:*:*:*:*:*:*",
              "matchCriteriaId": "67F50AF8-7B0E-4D01-9EB2-C6625E9DACB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update49:*:*:*:*:*:*",
              "matchCriteriaId": "131E4E65-D997-47F1-8CB8-15CE6A60AB1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*",
              "matchCriteriaId": "CCD1DEA0-8823-4780-B5EE-C1A2BB3C6B4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update51:*:*:*:*:*:*",
              "matchCriteriaId": "94AC684E-3C5F-4859-B6EB-42C478F9DD11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:*",
              "matchCriteriaId": "DC6FF5AB-B6E4-45D9-854B-29DEC200DA4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update53:*:*:*:*:*:*",
              "matchCriteriaId": "9855E3CB-925E-4623-A776-59422AB2FC6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update54:*:*:*:*:*:*",
              "matchCriteriaId": "01C3B7BE-1F9B-4EDA-990C-A4022CB85612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update55:*:*:*:*:*:*",
              "matchCriteriaId": "65CF766C-626D-4F8C-BDBF-F0C5404DD545",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update56:*:*:*:*:*:*",
              "matchCriteriaId": "720EF24C-9A36-405B-A380-6114C150B376",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update57:*:*:*:*:*:*",
              "matchCriteriaId": "44479EF5-40BD-43A2-AD0F-CE1660222AB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update58:*:*:*:*:*:*",
              "matchCriteriaId": "B8E0BD92-0F77-481E-8167-F81755E00703",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update59:*:*:*:*:*:*",
              "matchCriteriaId": "2BDB885E-814A-4CA8-A81C-1DB35989089B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update60:*:*:*:*:*:*",
              "matchCriteriaId": "B73DA1AE-C62F-4E62-AA98-5697656825F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update61:*:*:*:*:*:*",
              "matchCriteriaId": "D49DEE85-4DDB-4EF4-9F4D-11E7C1364055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update62:*:*:*:*:*:*",
              "matchCriteriaId": "365F28B6-DBF2-45BB-A06D-DD80CFBAD7BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update63:*:*:*:*:*:*",
              "matchCriteriaId": "5FDAD47C-C2DA-4533-AA58-DD6EC09A580A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update64:*:*:*:*:*:*",
              "matchCriteriaId": "5F81F36F-B20F-48B3-A1F2-3D319A34176B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update65:*:*:*:*:*:*",
              "matchCriteriaId": "754329CD-30B7-4410-A371-56A7C261B61B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update66:*:*:*:*:*:*",
              "matchCriteriaId": "C9445405-6B94-4DD1-BA94-B600AA316BB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update67:*:*:*:*:*:*",
              "matchCriteriaId": "960F3F22-9CC8-4655-9B09-777E5A5A1239",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update68:*:*:*:*:*:*",
              "matchCriteriaId": "D2B77C89-7F33-47A0-B6BF-473366033BEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update69:*:*:*:*:*:*",
              "matchCriteriaId": "8183B9D5-1C4D-4D30-BD85-13850FF34CB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update70:*:*:*:*:*:*",
              "matchCriteriaId": "1675366A-2388-4F7E-B423-D39BC7D3D38D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update71:*:*:*:*:*:*",
              "matchCriteriaId": "B93C3CF2-4F45-4F6C-AB6D-F9ABDA7C4DA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update72:*:*:*:*:*:*",
              "matchCriteriaId": "34A6A6A0-9307-4F5D-9605-1F786D1CD62A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update73:*:*:*:*:*:*",
              "matchCriteriaId": "6B994132-7103-4132-9D90-11CA264FEDE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update74:*:*:*:*:*:*",
              "matchCriteriaId": "A1958E04-AB8A-4B0E-AB45-B810CAED2EEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update75:*:*:*:*:*:*",
              "matchCriteriaId": "BB5558B0-6714-4B3A-B287-1943517A975A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update76:*:*:*:*:*:*",
              "matchCriteriaId": "7E325115-EEBC-41F4-8606-45270DA40B98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update77:*:*:*:*:*:*",
              "matchCriteriaId": "848B2C72-447D-46E2-A5A7-43CF3764E578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update78:*:*:*:*:*:*",
              "matchCriteriaId": "26A0AF15-52A9-46FD-8157-359141332EAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update79:*:*:*:*:*:*",
              "matchCriteriaId": "63D63872-C1D0-444F-BCC7-A514F323C256",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update80:*:*:*:*:*:*",
              "matchCriteriaId": "9D9FA9AD-39D3-412A-B794-E1B29EEEEC4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*",
              "matchCriteriaId": "294D8A56-A797-433C-A06E-106B2179151A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*",
              "matchCriteriaId": "824D88D9-4645-4CAD-8CAB-30F27DD388C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*",
              "matchCriteriaId": "F6E8C952-B455-46E4-AC3D-D38CAF189F60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*",
              "matchCriteriaId": "CD77C0EE-AC79-4443-A502-C1E02F806911",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*",
              "matchCriteriaId": "648EB53C-7A90-4DA6-BF1C-B5336CDE30C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update86:*:*:*:*:*:*",
              "matchCriteriaId": "39835EF7-8E93-4695-973D-6E9B76C67372",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update87:*:*:*:*:*:*",
              "matchCriteriaId": "2A05FB86-332B-44E3-93CB-82465A38976E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update88:*:*:*:*:*:*",
              "matchCriteriaId": "7C754823-899C-4EEF-ACB7-E1551FA88B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update89:*:*:*:*:*:*",
              "matchCriteriaId": "493D4C18-DEE2-4040-9C13-3A9AB2CE47BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update90:*:*:*:*:*:*",
              "matchCriteriaId": "8F17DD75-E63B-4E4C-B136-D43F17B389EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update91:*:*:*:*:*:*",
              "matchCriteriaId": "62EE759A-78AD-40D6-8C5B-10403A8A4A89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update92:*:*:*:*:*:*",
              "matchCriteriaId": "865ABA1F-CA99-4602-B325-F81C9778855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7B3A5E2-23CE-45A8-BD01-77024EB9F9A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF6451A-2A5D-4222-A1C6-113AA4B8D4E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D6CE430-3C95-4855-BA44-E2E136D1FEB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "44FEB149-C792-493D-B055-568FFC96298A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B050DD73-71B6-46CD-A35B-7ACB53BE6C6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "62432289-E1DC-4013-85C7-6B77299A910F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C96C4DE-61AD-4E88-81BF-8A4F50F06AA5",
              "versionEndExcluding": "7.4.3.102",
              "versionStartIncluding": "7.4.3.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Open redirect vulnerability in the Countries Management\u2019s edit region page in Liferay Portal 7.4.3.45 through 7.4.3.101, and Liferay DXP 2023.Q3 before patch 6, and 7.4 update 45 through 92 allows remote attackers to redirect users to arbitrary external URLs via the _com_liferay_address_web_internal_portlet_CountriesManagementAdminPortlet_redirect parameter."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de redireccionamiento abierto en la p\u00e1gina de edici\u00f3n de regi\u00f3n de Gesti\u00f3n de Pa\u00edses en Liferay Portal 7.4.3.45 a 7.4.3.101, y Liferay DXP 2023.Q3 antes del parche 6, y 7.4 actualizaci\u00f3n 45 a 92 permite a atacantes remotos redirigir a los usuarios a URL externas arbitrarias a trav\u00e9s de _com_liferay_address_web_internal_portlet_CountriesManagementAdminPortlet_redirect par\u00e1metro."
    }
  ],
  "id": "CVE-2023-5190",
  "lastModified": "2025-01-28T21:34:19.250",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-20T06:15:07.680",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-5190"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-5190"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-601"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-601"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-05-24 15:15
Modified
2024-11-21 08:06
Summary
Cross-site scripting (XSS) vulnerability in the Account module in Liferay Portal 7.4.3.21 through 7.4.3.62, and Liferay DXP 7.4 update 21 through 62 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a user's (1) First Name, (2) Middle Name, (3) Last Name, or (4) Job Title text field.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update21:*:*:*:*:*:*",
              "matchCriteriaId": "22B6B8C1-1FF3-41BC-9576-16193AE20CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update62:*:*:*:*:*:*",
              "matchCriteriaId": "365F28B6-DBF2-45BB-A06D-DD80CFBAD7BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AABBE89E-33BB-462C-B1CE-17A7E578B304",
              "versionEndIncluding": "7.4.3.62",
              "versionStartIncluding": "7.4.3.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the Account module in Liferay Portal 7.4.3.21 through 7.4.3.62, and Liferay DXP 7.4 update 21 through 62 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a user\u0027s (1) First Name, (2) Middle Name, (3) Last Name, or (4) Job Title text field."
    }
  ],
  "id": "CVE-2023-33943",
  "lastModified": "2024-11-21T08:06:15.600",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-05-24T15:15:09.897",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33943"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33943"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-20 14:15
Modified
2025-01-28 21:25
Summary
The Account Settings page in Liferay Portal 7.4.3.76 through 7.4.3.99, and Liferay DXP 2023.Q3 before patch 5, and 7.4 update 76 through 92 embeds the user’s hashed password in the page’s HTML source, which allows man-in-the-middle attackers to steal a user's hashed password.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DB383E5-7A0E-46A2-AB91-E4536889A6DB",
              "versionEndExcluding": "7.4.3.100",
              "versionStartIncluding": "7.4.3.76",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update76:*:*:*:*:*:*",
              "matchCriteriaId": "7E325115-EEBC-41F4-8606-45270DA40B98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update77:*:*:*:*:*:*",
              "matchCriteriaId": "848B2C72-447D-46E2-A5A7-43CF3764E578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update78:*:*:*:*:*:*",
              "matchCriteriaId": "26A0AF15-52A9-46FD-8157-359141332EAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update79:*:*:*:*:*:*",
              "matchCriteriaId": "63D63872-C1D0-444F-BCC7-A514F323C256",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update80:*:*:*:*:*:*",
              "matchCriteriaId": "9D9FA9AD-39D3-412A-B794-E1B29EEEEC4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*",
              "matchCriteriaId": "294D8A56-A797-433C-A06E-106B2179151A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*",
              "matchCriteriaId": "824D88D9-4645-4CAD-8CAB-30F27DD388C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*",
              "matchCriteriaId": "F6E8C952-B455-46E4-AC3D-D38CAF189F60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*",
              "matchCriteriaId": "CD77C0EE-AC79-4443-A502-C1E02F806911",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*",
              "matchCriteriaId": "648EB53C-7A90-4DA6-BF1C-B5336CDE30C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update86:*:*:*:*:*:*",
              "matchCriteriaId": "39835EF7-8E93-4695-973D-6E9B76C67372",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update87:*:*:*:*:*:*",
              "matchCriteriaId": "2A05FB86-332B-44E3-93CB-82465A38976E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update88:*:*:*:*:*:*",
              "matchCriteriaId": "7C754823-899C-4EEF-ACB7-E1551FA88B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update89:*:*:*:*:*:*",
              "matchCriteriaId": "493D4C18-DEE2-4040-9C13-3A9AB2CE47BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update90:*:*:*:*:*:*",
              "matchCriteriaId": "8F17DD75-E63B-4E4C-B136-D43F17B389EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update91:*:*:*:*:*:*",
              "matchCriteriaId": "62EE759A-78AD-40D6-8C5B-10403A8A4A89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update92:*:*:*:*:*:*",
              "matchCriteriaId": "865ABA1F-CA99-4602-B325-F81C9778855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7B3A5E2-23CE-45A8-BD01-77024EB9F9A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF6451A-2A5D-4222-A1C6-113AA4B8D4E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D6CE430-3C95-4855-BA44-E2E136D1FEB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "44FEB149-C792-493D-B055-568FFC96298A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B050DD73-71B6-46CD-A35B-7ACB53BE6C6A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Account Settings page in Liferay Portal 7.4.3.76 through 7.4.3.99, and Liferay DXP 2023.Q3 before patch 5, and 7.4 update 76 through 92 embeds the user\u2019s hashed password in the page\u2019s HTML source, which allows man-in-the-middle attackers to steal a user\u0027s hashed password."
    },
    {
      "lang": "es",
      "value": "La p\u00e1gina Configuraci\u00f3n de Cuenta en Liferay Portal 7.4.3.76 a 7.4.3.99, y Liferay DXP 2023.Q3 antes del parche 5, y 7.4 actualizaci\u00f3n 76 a 92 incorpora la contrase\u00f1a hash del usuario en el c\u00f3digo fuente HTML de la p\u00e1gina, lo que permite al hombre en el atacantes intermedios para robar la contrase\u00f1a hash de un usuario."
    }
  ],
  "id": "CVE-2024-26270",
  "lastModified": "2025-01-28T21:25:41.420",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-20T14:15:09.530",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-26270"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-26270"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-201"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-21 02:15
Modified
2025-01-28 21:25
Summary
Cross-site scripting (XSS) vulnerability in HtmlUtil.escapeJsLink in Liferay Portal 7.2.0 through 7.4.1, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 15, and older unsupported versions allows remote attackers to inject arbitrary web script or HTML via crafted javascript: style links.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "69440C19-B9E7-41F3-B731-B5C7E37C718A",
              "versionEndExcluding": "7.4.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459",
              "versionEndExcluding": "7.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "43F61E2F-4643-4D5D-84DB-7B7B6E93C67B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "8B057D81-7589-4007-9A0D-2D302B82F9CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "6F0F2558-6990-43D7-9FE2-8E99D81B8269",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "11072673-C3AB-42EA-A26F-890DEE903D42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "134560B0-9746-4EC3-8DE3-26E53E2CAC6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in HtmlUtil.escapeJsLink in Liferay Portal 7.2.0 through 7.4.1, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 15, and older unsupported versions allows remote attackers to inject arbitrary web script or HTML via crafted javascript: style links."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de Cross-site scripting (XSS) en HtmlUtil.escapeJsLink en Liferay Portal 7.2.0 a 7.4.1 y versiones anteriores no compatibles, y Liferay DXP 7.3 anterior al service pack 3, 7.2 anterior al fix pack 15 y versiones anteriores no compatibles, permite a atacantes remotos para inyectar script web o HTML arbitrarias a trav\u00e9s de enlaces de estilo javascript: manipulados."
    }
  ],
  "id": "CVE-2024-25147",
  "lastModified": "2025-01-28T21:25:53.533",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.6,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 6.0,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-21T02:15:29.750",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25147"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25147"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-20 10:15
Modified
2024-12-11 18:01
Summary
The default password hashing algorithm (PBKDF2-HMAC-SHA1) in Liferay Portal 7.2.0 through 7.4.3.15, and older unsupported versions, and Liferay DXP 7.4 before update 16, 7.3 before update 4, 7.2 before fix pack 17, and older unsupported versions defaults to a low work factor, which allows attackers to quickly crack password hashes.
Impacted products
Vendor Product Version
liferay digital_experience_platform *
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay liferay_portal *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459",
              "versionEndExcluding": "7.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "311EE92A-0EEF-4556-A52F-E6C9522FA2DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "49501C9E-D12A-45E0-92F3-8FD5FDC6D3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_17:*:*:*:*:*:*",
              "matchCriteriaId": "F2B55C77-9FAA-4E14-8CEF-9C4CAC804007",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "43F61E2F-4643-4D5D-84DB-7B7B6E93C67B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "8B057D81-7589-4007-9A0D-2D302B82F9CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "6F0F2558-6990-43D7-9FE2-8E99D81B8269",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "11072673-C3AB-42EA-A26F-890DEE903D42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "134560B0-9746-4EC3-8DE3-26E53E2CAC6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "728DF154-F19F-454C-87CA-1E755107F2A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
              "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update10:*:*:*:*:*:*",
              "matchCriteriaId": "C7B02106-D5EA-4A59-A959-CCE2AC8F55BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update11:*:*:*:*:*:*",
              "matchCriteriaId": "80204464-5DC5-4A52-B844-C833A96E6BD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update12:*:*:*:*:*:*",
              "matchCriteriaId": "6F8A5D02-0B45-4DA9-ACD8-42C1BFF62827",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update13:*:*:*:*:*:*",
              "matchCriteriaId": "38DA7C99-AC2C-4B9A-B611-4697159E1D79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update14:*:*:*:*:*:*",
              "matchCriteriaId": "F264AD07-D105-4F00-8920-6D8146E4FA63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update15:*:*:*:*:*:*",
              "matchCriteriaId": "C929CF16-4725-492A-872B-0928FE388FC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update2:*:*:*:*:*:*",
              "matchCriteriaId": "10B863B8-201D-494C-8175-168820996174",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update3:*:*:*:*:*:*",
              "matchCriteriaId": "CBF766CE-CBB8-472A-BAF0-BD39A7BCB4DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update4:*:*:*:*:*:*",
              "matchCriteriaId": "182FAA46-D9FB-4170-B305-BAD0DF6E5DE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update5:*:*:*:*:*:*",
              "matchCriteriaId": "DF1BB9E6-D690-4C12-AEF0-4BD712869CBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update6:*:*:*:*:*:*",
              "matchCriteriaId": "653A0452-070F-4312-B94A-F5BCB01B9BDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update7:*:*:*:*:*:*",
              "matchCriteriaId": "15B67345-D0AF-4BFD-A62D-870F75306A4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update8:*:*:*:*:*:*",
              "matchCriteriaId": "DE1F4262-A054-48CC-BF1D-AA77A94FFFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update9:*:*:*:*:*:*",
              "matchCriteriaId": "D176CECA-2821-49EA-86EC-1184C133C0A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E43CC402-96D6-414B-9636-42D7EA642FD6",
              "versionEndIncluding": "7.4.3.15",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The default password hashing algorithm (PBKDF2-HMAC-SHA1) in Liferay Portal 7.2.0 through 7.4.3.15, and older unsupported versions, and Liferay DXP 7.4 before update 16, 7.3 before update 4, 7.2 before fix pack 17, and older unsupported versions defaults to a low work factor, which allows attackers to quickly crack password hashes."
    },
    {
      "lang": "es",
      "value": "El algoritmo de hash de contrase\u00f1a predeterminado (PBKDF2-HMAC-SHA1) en Liferay Portal 7.2.0 a 7.4.3.15 y versiones anteriores no compatibles, y Liferay DXP 7.4 antes de la actualizaci\u00f3n 16, 7.3 antes de la actualizaci\u00f3n 4, 7.2 antes del fixpack 17 y anteriores no compatibles Las versiones tienen por defecto un factor de trabajo bajo, lo que permite a los atacantes descifrar r\u00e1pidamente hashes de contrase\u00f1as."
    }
  ],
  "id": "CVE-2024-25607",
  "lastModified": "2024-12-11T18:01:46.027",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 8.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.2,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-20T10:15:08.333",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25607"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25607"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-916"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-916"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-04-19 13:15
Modified
2024-11-21 06:54
Summary
Cross-site scripting (XSS) vulnerability in the Asset module's asset categories selector in Liferay Portal 7.3.3 through 7.4.0, and Liferay DXP 7.3 before service pack 3 allows remote attackers to inject arbitrary web script or HTML via the name of a asset category.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF5BFC45-3970-43D5-A064-D8785677E26C",
              "versionEndExcluding": "7.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1374F32-A990-4892-BF5F-E80D2B54E760",
              "versionEndExcluding": "7.3.7",
              "versionStartIncluding": "7.3.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:7.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D77AE89B-3769-4AEC-AF7B-00AAE3F345F9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the Asset module\u0027s asset categories selector in Liferay Portal 7.3.3 through 7.4.0, and Liferay DXP 7.3 before service pack 3 allows remote attackers to inject arbitrary web script or HTML via the name of a asset category."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de tipo Cross-site scripting (XSS) en el selector de categor\u00edas de activos del m\u00f3dulo Asset en Liferay Portal versiones 7.3.3 hasta 7.4.0, y Liferay DXP versiones 7.3 anteriores al Service Pack 3 permite a atacantes remotos inyectar scripts web arbitrarios o HTML arbitrarios por medio del nombre de una categor\u00eda de activos"
    }
  ],
  "id": "CVE-2022-26593",
  "lastModified": "2024-11-21T06:54:10.810",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-04-19T13:15:08.393",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-26593-stored-xss-with-category-name-in-asset-categories-selector"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-26593-stored-xss-with-category-name-in-asset-categories-selector"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-12-17 22:15
Modified
2025-01-28 21:18
Summary
Cross-site scripting (XSS) vulnerability in the edit Service Access Policy page in Liferay Portal 7.0.0 through 7.4.3.87, and Liferay DXP 7.4 GA through update 87, 7.3 GA through update 29, and older unsupported versions allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a service access policy's `Service Class` text field.
Impacted products
Vendor Product Version
liferay liferay_portal *
liferay digital_experience_platform *
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB292A92-C12B-486D-B4EE-421BFFD636AF",
              "versionEndExcluding": "7.4.3.88",
              "versionStartIncluding": "7.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F20477F-7F50-40D8-8DB2-251B4BC74207",
              "versionEndExcluding": "7.3",
              "versionStartIncluding": "7.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "728DF154-F19F-454C-87CA-1E755107F2A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update10:*:*:*:*:*:*",
              "matchCriteriaId": "AA984F92-4C6C-4049-A731-96F587B51E75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update11:*:*:*:*:*:*",
              "matchCriteriaId": "CADDF499-DDC4-4CEE-B512-404EA2024FCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update12:*:*:*:*:*:*",
              "matchCriteriaId": "9EC64246-1039-4009-B9BD-7828FA0FA1C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update13:*:*:*:*:*:*",
              "matchCriteriaId": "D9F352AE-AE22-4A84-94B6-6621D7E0BC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update14:*:*:*:*:*:*",
              "matchCriteriaId": "3E84D881-6D47-48FD-B743-9D531F5F7D5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update15:*:*:*:*:*:*",
              "matchCriteriaId": "1F8A9DEC-2C27-4EBB-B684-8EBDB374CFCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update16:*:*:*:*:*:*",
              "matchCriteriaId": "C3E7B777-8026-4C8F-9353-B5504873E0F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update17:*:*:*:*:*:*",
              "matchCriteriaId": "2207FEE5-2537-4C6E-AC9C-EC53DBF3C57E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update18:*:*:*:*:*:*",
              "matchCriteriaId": "087A2B43-07CE-4B3D-B879-449631DDA8D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update19:*:*:*:*:*:*",
              "matchCriteriaId": "019CED83-6277-434C-839C-6C4E0C45FB1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update20:*:*:*:*:*:*",
              "matchCriteriaId": "6C533124-74E6-4312-9AF7-6496DE2A5152",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update21:*:*:*:*:*:*",
              "matchCriteriaId": "8DDA248D-5F00-4FC1-B857-A7942BAA1F3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update22:*:*:*:*:*:*",
              "matchCriteriaId": "6C6BA174-69D4-43FC-9395-1B6306A44CDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update23:*:*:*:*:*:*",
              "matchCriteriaId": "A465C229-D3FB-43E9-87BE-119BEE9110F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update24:*:*:*:*:*:*",
              "matchCriteriaId": "32E98546-CE96-4BB8-A11C-F7E850C155F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update25:*:*:*:*:*:*",
              "matchCriteriaId": "DD43C626-F2F2-43BA-85AA-6ADAE8A6D11F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update26:*:*:*:*:*:*",
              "matchCriteriaId": "5C72C0E0-7D0B-4E8F-A109-7BB5DCA1C8D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update27:*:*:*:*:*:*",
              "matchCriteriaId": "7E796B04-FF54-4C02-979C-87E137A76F63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update28:*:*:*:*:*:*",
              "matchCriteriaId": "07C3D771-5E1B-46C4-AAF8-F425377582D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update29:*:*:*:*:*:*",
              "matchCriteriaId": "B08F95DC-BE49-4717-B959-2BE8BD131953",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update4:*:*:*:*:*:*",
              "matchCriteriaId": "AD408C73-7D78-4EB1-AA2C-F4A6D4DC980B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update5:*:*:*:*:*:*",
              "matchCriteriaId": "513F3229-7C31-44EB-88F6-E564BE725853",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update6:*:*:*:*:*:*",
              "matchCriteriaId": "76B9CD05-A10E-439C-9FDE-EA88EC3AF2C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update7:*:*:*:*:*:*",
              "matchCriteriaId": "A7D2D415-36AA-41B2-8FD9-21A98CDFE1EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update8:*:*:*:*:*:*",
              "matchCriteriaId": "124F2D2E-F8E7-4EDE-A98B-DD72FB43DF20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update9:*:*:*:*:*:*",
              "matchCriteriaId": "0DEE5985-289E-4138-B7C0-1E471BA7A1FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
              "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update10:*:*:*:*:*:*",
              "matchCriteriaId": "C7B02106-D5EA-4A59-A959-CCE2AC8F55BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update11:*:*:*:*:*:*",
              "matchCriteriaId": "80204464-5DC5-4A52-B844-C833A96E6BD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update12:*:*:*:*:*:*",
              "matchCriteriaId": "6F8A5D02-0B45-4DA9-ACD8-42C1BFF62827",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update13:*:*:*:*:*:*",
              "matchCriteriaId": "38DA7C99-AC2C-4B9A-B611-4697159E1D79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update14:*:*:*:*:*:*",
              "matchCriteriaId": "F264AD07-D105-4F00-8920-6D8146E4FA63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update15:*:*:*:*:*:*",
              "matchCriteriaId": "C929CF16-4725-492A-872B-0928FE388FC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update16:*:*:*:*:*:*",
              "matchCriteriaId": "1B8750A1-E481-48D4-84F4-97D1ABE15B46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update17:*:*:*:*:*:*",
              "matchCriteriaId": "454F8410-D9AC-481E-841C-60F0DF2CC25E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update18:*:*:*:*:*:*",
              "matchCriteriaId": "D1A442EE-460F-4823-B9EF-4421050F0847",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update19:*:*:*:*:*:*",
              "matchCriteriaId": "608B205D-0B79-4D1C-B2C1-64C31DB1896E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update2:*:*:*:*:*:*",
              "matchCriteriaId": "10B863B8-201D-494C-8175-168820996174",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update20:*:*:*:*:*:*",
              "matchCriteriaId": "4427DC78-E80C-4057-A295-B0731437A99E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update21:*:*:*:*:*:*",
              "matchCriteriaId": "22B6B8C1-1FF3-41BC-9576-16193AE20CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update22:*:*:*:*:*:*",
              "matchCriteriaId": "DDA17F24-1A7E-4BEB-9C98-41761A2A36A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update23:*:*:*:*:*:*",
              "matchCriteriaId": "3B062851-CE6B-44F4-8222-422EC9872EC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update24:*:*:*:*:*:*",
              "matchCriteriaId": "D4687FDA-0078-4E89-ADD8-7EDDA68261A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update25:*:*:*:*:*:*",
              "matchCriteriaId": "7EA29B09-CC24-4063-96A5-96AA08C0886D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update26:*:*:*:*:*:*",
              "matchCriteriaId": "331FC246-D3E9-4711-B305-BE51BF743CF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update27:*:*:*:*:*:*",
              "matchCriteriaId": "A5823BC0-8C11-4C31-9E99-3C9D82918E2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update28:*:*:*:*:*:*",
              "matchCriteriaId": "E2E6CB66-1AE1-4626-8070-64C250ED8363",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update29:*:*:*:*:*:*",
              "matchCriteriaId": "B63449AA-6831-4290-B1FA-0BB806820402",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update3:*:*:*:*:*:*",
              "matchCriteriaId": "CBF766CE-CBB8-472A-BAF0-BD39A7BCB4DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update30:*:*:*:*:*:*",
              "matchCriteriaId": "B3B169F6-B8B8-4612-AD7D-F75CC6A9297B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update31:*:*:*:*:*:*",
              "matchCriteriaId": "12D46756-D26D-4877-ACE8-1C2721908428",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update32:*:*:*:*:*:*",
              "matchCriteriaId": "5403DCEF-20C2-4568-8DF1-30804F522915",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update33:*:*:*:*:*:*",
              "matchCriteriaId": "90E39742-90BE-4DEB-AB78-F9B8F7333F9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update34:*:*:*:*:*:*",
              "matchCriteriaId": "9D07DB20-9DCF-4C05-99D2-F6B37A082C14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update35:*:*:*:*:*:*",
              "matchCriteriaId": "341D1157-8118-4BD3-A902-36E90E066706",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update36:*:*:*:*:*:*",
              "matchCriteriaId": "1AB71307-7EAA-436A-9CBC-5A94F034FB48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update37:*:*:*:*:*:*",
              "matchCriteriaId": "9446B3A5-6647-416C-92AF-7B6E0E929765",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update38:*:*:*:*:*:*",
              "matchCriteriaId": "06386C7A-CAA1-4FC4-9182-5A66342FB903",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update39:*:*:*:*:*:*",
              "matchCriteriaId": "8C84B701-B9A1-43D0-AF0C-30EDBD24CF90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update4:*:*:*:*:*:*",
              "matchCriteriaId": "182FAA46-D9FB-4170-B305-BAD0DF6E5DE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update40:*:*:*:*:*:*",
              "matchCriteriaId": "BA9AF651-D118-4437-B400-531B26BF6801",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update41:*:*:*:*:*:*",
              "matchCriteriaId": "2B256485-E289-4092-B45B-835DE12625B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update42:*:*:*:*:*:*",
              "matchCriteriaId": "119B54BD-75F4-46A4-A57D-16CFF4E12CEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update43:*:*:*:*:*:*",
              "matchCriteriaId": "A3382E2D-A414-40A1-A330-619859756A36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update44:*:*:*:*:*:*",
              "matchCriteriaId": "2E07B750-55B6-4DB6-B02B-216C2F5505A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update45:*:*:*:*:*:*",
              "matchCriteriaId": "B921E670-480F-4793-A636-3855A1654908",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update46:*:*:*:*:*:*",
              "matchCriteriaId": "62AE52FE-FB7F-4339-BDDE-E5AD235BBC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update47:*:*:*:*:*:*",
              "matchCriteriaId": "C99508DB-19E9-4832-AB38-57C61C7D68BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update48:*:*:*:*:*:*",
              "matchCriteriaId": "67F50AF8-7B0E-4D01-9EB2-C6625E9DACB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update49:*:*:*:*:*:*",
              "matchCriteriaId": "131E4E65-D997-47F1-8CB8-15CE6A60AB1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update5:*:*:*:*:*:*",
              "matchCriteriaId": "DF1BB9E6-D690-4C12-AEF0-4BD712869CBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*",
              "matchCriteriaId": "CCD1DEA0-8823-4780-B5EE-C1A2BB3C6B4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update51:*:*:*:*:*:*",
              "matchCriteriaId": "94AC684E-3C5F-4859-B6EB-42C478F9DD11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:*",
              "matchCriteriaId": "DC6FF5AB-B6E4-45D9-854B-29DEC200DA4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update53:*:*:*:*:*:*",
              "matchCriteriaId": "9855E3CB-925E-4623-A776-59422AB2FC6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update54:*:*:*:*:*:*",
              "matchCriteriaId": "01C3B7BE-1F9B-4EDA-990C-A4022CB85612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update55:*:*:*:*:*:*",
              "matchCriteriaId": "65CF766C-626D-4F8C-BDBF-F0C5404DD545",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update56:*:*:*:*:*:*",
              "matchCriteriaId": "720EF24C-9A36-405B-A380-6114C150B376",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update57:*:*:*:*:*:*",
              "matchCriteriaId": "44479EF5-40BD-43A2-AD0F-CE1660222AB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update58:*:*:*:*:*:*",
              "matchCriteriaId": "B8E0BD92-0F77-481E-8167-F81755E00703",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update59:*:*:*:*:*:*",
              "matchCriteriaId": "2BDB885E-814A-4CA8-A81C-1DB35989089B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update6:*:*:*:*:*:*",
              "matchCriteriaId": "653A0452-070F-4312-B94A-F5BCB01B9BDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update60:*:*:*:*:*:*",
              "matchCriteriaId": "B73DA1AE-C62F-4E62-AA98-5697656825F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update61:*:*:*:*:*:*",
              "matchCriteriaId": "D49DEE85-4DDB-4EF4-9F4D-11E7C1364055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update62:*:*:*:*:*:*",
              "matchCriteriaId": "365F28B6-DBF2-45BB-A06D-DD80CFBAD7BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update63:*:*:*:*:*:*",
              "matchCriteriaId": "5FDAD47C-C2DA-4533-AA58-DD6EC09A580A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update64:*:*:*:*:*:*",
              "matchCriteriaId": "5F81F36F-B20F-48B3-A1F2-3D319A34176B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update65:*:*:*:*:*:*",
              "matchCriteriaId": "754329CD-30B7-4410-A371-56A7C261B61B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update66:*:*:*:*:*:*",
              "matchCriteriaId": "C9445405-6B94-4DD1-BA94-B600AA316BB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update67:*:*:*:*:*:*",
              "matchCriteriaId": "960F3F22-9CC8-4655-9B09-777E5A5A1239",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update68:*:*:*:*:*:*",
              "matchCriteriaId": "D2B77C89-7F33-47A0-B6BF-473366033BEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update69:*:*:*:*:*:*",
              "matchCriteriaId": "8183B9D5-1C4D-4D30-BD85-13850FF34CB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update7:*:*:*:*:*:*",
              "matchCriteriaId": "15B67345-D0AF-4BFD-A62D-870F75306A4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update70:*:*:*:*:*:*",
              "matchCriteriaId": "1675366A-2388-4F7E-B423-D39BC7D3D38D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update71:*:*:*:*:*:*",
              "matchCriteriaId": "B93C3CF2-4F45-4F6C-AB6D-F9ABDA7C4DA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update72:*:*:*:*:*:*",
              "matchCriteriaId": "34A6A6A0-9307-4F5D-9605-1F786D1CD62A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update73:*:*:*:*:*:*",
              "matchCriteriaId": "6B994132-7103-4132-9D90-11CA264FEDE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update74:*:*:*:*:*:*",
              "matchCriteriaId": "A1958E04-AB8A-4B0E-AB45-B810CAED2EEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update75:*:*:*:*:*:*",
              "matchCriteriaId": "BB5558B0-6714-4B3A-B287-1943517A975A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update76:*:*:*:*:*:*",
              "matchCriteriaId": "7E325115-EEBC-41F4-8606-45270DA40B98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update77:*:*:*:*:*:*",
              "matchCriteriaId": "848B2C72-447D-46E2-A5A7-43CF3764E578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update78:*:*:*:*:*:*",
              "matchCriteriaId": "26A0AF15-52A9-46FD-8157-359141332EAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update79:*:*:*:*:*:*",
              "matchCriteriaId": "63D63872-C1D0-444F-BCC7-A514F323C256",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update8:*:*:*:*:*:*",
              "matchCriteriaId": "DE1F4262-A054-48CC-BF1D-AA77A94FFFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update80:*:*:*:*:*:*",
              "matchCriteriaId": "9D9FA9AD-39D3-412A-B794-E1B29EEEEC4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*",
              "matchCriteriaId": "294D8A56-A797-433C-A06E-106B2179151A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*",
              "matchCriteriaId": "824D88D9-4645-4CAD-8CAB-30F27DD388C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*",
              "matchCriteriaId": "F6E8C952-B455-46E4-AC3D-D38CAF189F60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*",
              "matchCriteriaId": "CD77C0EE-AC79-4443-A502-C1E02F806911",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*",
              "matchCriteriaId": "648EB53C-7A90-4DA6-BF1C-B5336CDE30C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update86:*:*:*:*:*:*",
              "matchCriteriaId": "39835EF7-8E93-4695-973D-6E9B76C67372",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update87:*:*:*:*:*:*",
              "matchCriteriaId": "2A05FB86-332B-44E3-93CB-82465A38976E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update9:*:*:*:*:*:*",
              "matchCriteriaId": "D176CECA-2821-49EA-86EC-1184C133C0A3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the edit Service Access Policy page in Liferay Portal 7.0.0 through 7.4.3.87, and Liferay DXP 7.4 GA through update 87, 7.3 GA through update 29, and older unsupported versions allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a service access policy\u0027s `Service Class` text field."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de cross-site scripting (XSS) en Service Access Policy page en Liferay Portal 7.0.0 a 7.4.3.87, y Liferay DXP 7.4 GA a la actualizaci\u00f3n 87, 7.3 GA a la actualizaci\u00f3n 29 y versiones anteriores no compatibles permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el campo de texto \"Clase de servicio\" de una pol\u00edtica de acceso al servicio."
    }
  ],
  "id": "CVE-2023-37940",
  "lastModified": "2025-01-28T21:18:48.497",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.7,
        "impactScore": 2.7,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.7,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-12-17T22:15:05.080",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2023-37940"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security@liferay.com",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-03-02 19:15
Modified
2024-11-21 06:16
Summary
The Dynamic Data Mapping module in Liferay Portal 7.0.0 through 7.3.6, and Liferay DXP 7.0 before fix pack 101, 7.1 before fix pack 21, 7.2 before fix pack 10 and 7.3 before fix pack 2 incorrectly sets default permissions for site members, which allows remote authenticated users with the site member role to add and duplicate forms, via the UI or the API.
References
cve@mitre.orghttp://liferay.comVendor Advisory
cve@mitre.orghttps://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38268-site-member-can-add-new-forms-by-defaultVendor Advisory
cve@mitre.orghttps://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38268-site-member-can-add-new-forms-by-default?_com_liferay_asset_publisher_web_portlet_AssetPublisherPortlet_INSTANCE_HbL5mxmVrnXW_assetEntryId=120882524&_com_liferay_asset_publisher_web_portlet_AssetPublisherPortlet_INSTANCE_HbL5mxmVrnXW_redirect=https%3A%2F%2Fportal.liferay.dev%3A443%2Flearn%2Fsecurity%2Fknown-vulnerabilities%3Fp_p_id%3Dcom_liferay_asset_publisher_web_portlet_AssetPPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://liferay.comVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38268-site-member-can-add-new-forms-by-defaultVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38268-site-member-can-add-new-forms-by-default?_com_liferay_asset_publisher_web_portlet_AssetPublisherPortlet_INSTANCE_HbL5mxmVrnXW_assetEntryId=120882524&_com_liferay_asset_publisher_web_portlet_AssetPublisherPortlet_INSTANCE_HbL5mxmVrnXW_redirect=https%3A%2F%2Fportal.liferay.dev%3A443%2Flearn%2Fsecurity%2Fknown-vulnerabilities%3Fp_p_id%3Dcom_liferay_asset_publisher_web_portlet_AssetPPatch, Vendor Advisory



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "092D727C-B318-4F8C-8698-7DC78ABE2237",
              "versionEndExcluding": "7.2.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:community:*:*:*",
              "matchCriteriaId": "5F76965E-CCB6-407B-88B7-7C5B70DE8408",
              "versionEndExcluding": "7.3.7",
              "versionStartIncluding": "7.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Dynamic Data Mapping module in Liferay Portal 7.0.0 through 7.3.6, and Liferay DXP 7.0 before fix pack 101, 7.1 before fix pack 21, 7.2 before fix pack 10 and 7.3 before fix pack 2 incorrectly sets default permissions for site members, which allows remote authenticated users with the site member role to add and duplicate forms, via the UI or the API."
    },
    {
      "lang": "es",
      "value": "El m\u00f3dulo Dynamic Data Mapping en Liferay Portal 7.0.0 hasta 7.3.6, y Liferay DXP 7.0 antes del fix pack 101, 7.1 antes del fix pack 21, 7.2 antes del fix pack 10 y 7.3 antes del fix pack 2 establece incorrectamente los permisos por defecto para los miembros del sitio, lo que permite a los usuarios remotos autentificados con el rol de miembro del sitio a\u00f1adir y duplicar formularios, a trav\u00e9s de la UI o la API"
    }
  ],
  "id": "CVE-2021-38268",
  "lastModified": "2024-11-21T06:16:42.813",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-03-02T19:15:07.880",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38268-site-member-can-add-new-forms-by-default"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38268-site-member-can-add-new-forms-by-default?_com_liferay_asset_publisher_web_portlet_AssetPublisherPortlet_INSTANCE_HbL5mxmVrnXW_assetEntryId=120882524\u0026_com_liferay_asset_publisher_web_portlet_AssetPublisherPortlet_INSTANCE_HbL5mxmVrnXW_redirect=https%3A%2F%2Fportal.liferay.dev%3A443%2Flearn%2Fsecurity%2Fknown-vulnerabilities%3Fp_p_id%3Dcom_liferay_asset_publisher_web_portlet_AssetP"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38268-site-member-can-add-new-forms-by-default"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38268-site-member-can-add-new-forms-by-default?_com_liferay_asset_publisher_web_portlet_AssetPublisherPortlet_INSTANCE_HbL5mxmVrnXW_assetEntryId=120882524\u0026_com_liferay_asset_publisher_web_portlet_AssetPublisherPortlet_INSTANCE_HbL5mxmVrnXW_redirect=https%3A%2F%2Fportal.liferay.dev%3A443%2Flearn%2Fsecurity%2Fknown-vulnerabilities%3Fp_p_id%3Dcom_liferay_asset_publisher_web_portlet_AssetP"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-276"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-21 03:15
Modified
2025-01-28 21:18
Summary
Reflected cross-site scripting (XSS) vulnerability in the instance settings for Accounts in Liferay Portal 7.4.3.44 through 7.4.3.97, and Liferay DXP 2023.Q3 before patch 6, and 7.4 update 44 through 92 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into the “Blocked Email Domains” text field
Impacted products
Vendor Product Version
liferay liferay_portal *
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 2023.q3.0
liferay digital_experience_platform 2023.q3.1
liferay digital_experience_platform 2023.q3.2
liferay digital_experience_platform 2023.q3.3
liferay digital_experience_platform 2023.q3.4
liferay digital_experience_platform 2023.q3.5



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F975792-5DD1-4202-A0E8-EEC7CB49C656",
              "versionEndExcluding": "7.4.3.98",
              "versionStartIncluding": "7.4.3.44",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update44:*:*:*:*:*:*",
              "matchCriteriaId": "2E07B750-55B6-4DB6-B02B-216C2F5505A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update45:*:*:*:*:*:*",
              "matchCriteriaId": "B921E670-480F-4793-A636-3855A1654908",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update46:*:*:*:*:*:*",
              "matchCriteriaId": "62AE52FE-FB7F-4339-BDDE-E5AD235BBC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update47:*:*:*:*:*:*",
              "matchCriteriaId": "C99508DB-19E9-4832-AB38-57C61C7D68BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update48:*:*:*:*:*:*",
              "matchCriteriaId": "67F50AF8-7B0E-4D01-9EB2-C6625E9DACB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update49:*:*:*:*:*:*",
              "matchCriteriaId": "131E4E65-D997-47F1-8CB8-15CE6A60AB1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*",
              "matchCriteriaId": "CCD1DEA0-8823-4780-B5EE-C1A2BB3C6B4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update51:*:*:*:*:*:*",
              "matchCriteriaId": "94AC684E-3C5F-4859-B6EB-42C478F9DD11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:*",
              "matchCriteriaId": "DC6FF5AB-B6E4-45D9-854B-29DEC200DA4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update53:*:*:*:*:*:*",
              "matchCriteriaId": "9855E3CB-925E-4623-A776-59422AB2FC6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update54:*:*:*:*:*:*",
              "matchCriteriaId": "01C3B7BE-1F9B-4EDA-990C-A4022CB85612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update55:*:*:*:*:*:*",
              "matchCriteriaId": "65CF766C-626D-4F8C-BDBF-F0C5404DD545",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update56:*:*:*:*:*:*",
              "matchCriteriaId": "720EF24C-9A36-405B-A380-6114C150B376",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update57:*:*:*:*:*:*",
              "matchCriteriaId": "44479EF5-40BD-43A2-AD0F-CE1660222AB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update58:*:*:*:*:*:*",
              "matchCriteriaId": "B8E0BD92-0F77-481E-8167-F81755E00703",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update59:*:*:*:*:*:*",
              "matchCriteriaId": "2BDB885E-814A-4CA8-A81C-1DB35989089B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update60:*:*:*:*:*:*",
              "matchCriteriaId": "B73DA1AE-C62F-4E62-AA98-5697656825F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update61:*:*:*:*:*:*",
              "matchCriteriaId": "D49DEE85-4DDB-4EF4-9F4D-11E7C1364055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update62:*:*:*:*:*:*",
              "matchCriteriaId": "365F28B6-DBF2-45BB-A06D-DD80CFBAD7BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update63:*:*:*:*:*:*",
              "matchCriteriaId": "5FDAD47C-C2DA-4533-AA58-DD6EC09A580A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update64:*:*:*:*:*:*",
              "matchCriteriaId": "5F81F36F-B20F-48B3-A1F2-3D319A34176B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update65:*:*:*:*:*:*",
              "matchCriteriaId": "754329CD-30B7-4410-A371-56A7C261B61B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update66:*:*:*:*:*:*",
              "matchCriteriaId": "C9445405-6B94-4DD1-BA94-B600AA316BB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update67:*:*:*:*:*:*",
              "matchCriteriaId": "960F3F22-9CC8-4655-9B09-777E5A5A1239",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update68:*:*:*:*:*:*",
              "matchCriteriaId": "D2B77C89-7F33-47A0-B6BF-473366033BEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update69:*:*:*:*:*:*",
              "matchCriteriaId": "8183B9D5-1C4D-4D30-BD85-13850FF34CB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update70:*:*:*:*:*:*",
              "matchCriteriaId": "1675366A-2388-4F7E-B423-D39BC7D3D38D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update71:*:*:*:*:*:*",
              "matchCriteriaId": "B93C3CF2-4F45-4F6C-AB6D-F9ABDA7C4DA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update72:*:*:*:*:*:*",
              "matchCriteriaId": "34A6A6A0-9307-4F5D-9605-1F786D1CD62A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update73:*:*:*:*:*:*",
              "matchCriteriaId": "6B994132-7103-4132-9D90-11CA264FEDE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update74:*:*:*:*:*:*",
              "matchCriteriaId": "A1958E04-AB8A-4B0E-AB45-B810CAED2EEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update75:*:*:*:*:*:*",
              "matchCriteriaId": "BB5558B0-6714-4B3A-B287-1943517A975A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update76:*:*:*:*:*:*",
              "matchCriteriaId": "7E325115-EEBC-41F4-8606-45270DA40B98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update77:*:*:*:*:*:*",
              "matchCriteriaId": "848B2C72-447D-46E2-A5A7-43CF3764E578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update78:*:*:*:*:*:*",
              "matchCriteriaId": "26A0AF15-52A9-46FD-8157-359141332EAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update79:*:*:*:*:*:*",
              "matchCriteriaId": "63D63872-C1D0-444F-BCC7-A514F323C256",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update80:*:*:*:*:*:*",
              "matchCriteriaId": "9D9FA9AD-39D3-412A-B794-E1B29EEEEC4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*",
              "matchCriteriaId": "294D8A56-A797-433C-A06E-106B2179151A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*",
              "matchCriteriaId": "824D88D9-4645-4CAD-8CAB-30F27DD388C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*",
              "matchCriteriaId": "F6E8C952-B455-46E4-AC3D-D38CAF189F60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*",
              "matchCriteriaId": "CD77C0EE-AC79-4443-A502-C1E02F806911",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*",
              "matchCriteriaId": "648EB53C-7A90-4DA6-BF1C-B5336CDE30C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update86:*:*:*:*:*:*",
              "matchCriteriaId": "39835EF7-8E93-4695-973D-6E9B76C67372",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update87:*:*:*:*:*:*",
              "matchCriteriaId": "2A05FB86-332B-44E3-93CB-82465A38976E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update88:*:*:*:*:*:*",
              "matchCriteriaId": "7C754823-899C-4EEF-ACB7-E1551FA88B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update89:*:*:*:*:*:*",
              "matchCriteriaId": "493D4C18-DEE2-4040-9C13-3A9AB2CE47BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update90:*:*:*:*:*:*",
              "matchCriteriaId": "8F17DD75-E63B-4E4C-B136-D43F17B389EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update91:*:*:*:*:*:*",
              "matchCriteriaId": "62EE759A-78AD-40D6-8C5B-10403A8A4A89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update92:*:*:*:*:*:*",
              "matchCriteriaId": "865ABA1F-CA99-4602-B325-F81C9778855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7B3A5E2-23CE-45A8-BD01-77024EB9F9A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF6451A-2A5D-4222-A1C6-113AA4B8D4E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D6CE430-3C95-4855-BA44-E2E136D1FEB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "44FEB149-C792-493D-B055-568FFC96298A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B050DD73-71B6-46CD-A35B-7ACB53BE6C6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "62432289-E1DC-4013-85C7-6B77299A910F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Reflected cross-site scripting (XSS) vulnerability in the instance settings for Accounts in Liferay Portal 7.4.3.44 through 7.4.3.97, and Liferay DXP 2023.Q3 before patch 6, and 7.4 update 44 through 92 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into the \u201cBlocked Email Domains\u201d text field"
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de Cross-site scripting (XSS) reflejado en la configuraci\u00f3n de instancia para cuentas en Liferay Portal 7.4.3.44 a 7.4.3.97, y Liferay DXP 2023.Q3 antes del parche 6, y 7.4 actualizaci\u00f3n 44 a 92 permite a atacantes remotos inyectar script arbitrarios o HTML a trav\u00e9s de un payload manipulado inyectado en el campo de texto \"Dominios de correo electr\u00f3nico bloqueados\""
    }
  ],
  "id": "CVE-2023-40191",
  "lastModified": "2025-01-28T21:18:13.967",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.0,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 6.0,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-21T03:15:07.870",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-40191"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-40191"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-20 14:15
Modified
2025-01-28 21:37
Summary
User enumeration vulnerability in Liferay Portal 7.2.0 through 7.4.3.26, and older unsupported versions, and Liferay DXP 7.4 before update 27, 7.3 before update 8, 7.2 before fix pack 20, and older unsupported versions allows remote attackers to determine if an account exist in the application by comparing the request's response time.
Impacted products
Vendor Product Version
liferay liferay_portal *
liferay liferay_portal *
liferay digital_experience_platform *
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1BD676-9B8D-44B0-9EAA-777EC43859DB",
              "versionEndIncluding": "7.3.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE5E4603-8FA6-4041-8C76-46374C479191",
              "versionEndExcluding": "7.4.3.27",
              "versionStartIncluding": "7.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459",
              "versionEndExcluding": "7.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "311EE92A-0EEF-4556-A52F-E6C9522FA2DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "49501C9E-D12A-45E0-92F3-8FD5FDC6D3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_17:*:*:*:*:*:*",
              "matchCriteriaId": "F2B55C77-9FAA-4E14-8CEF-9C4CAC804007",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_18:*:*:*:*:*:*",
              "matchCriteriaId": "54E499E6-C747-476B-BFE2-C04D9F8744F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_19:*:*:*:*:*:*",
              "matchCriteriaId": "6A773FC6-429D-483D-9736-25323B55A71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "43F61E2F-4643-4D5D-84DB-7B7B6E93C67B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "8B057D81-7589-4007-9A0D-2D302B82F9CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "6F0F2558-6990-43D7-9FE2-8E99D81B8269",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "11072673-C3AB-42EA-A26F-890DEE903D42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "134560B0-9746-4EC3-8DE3-26E53E2CAC6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "71E41E59-D71F-48F0-812B-39D59F81997B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "B6AAAAF1-994E-409D-8FC7-DE2A2CF60AD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "728DF154-F19F-454C-87CA-1E755107F2A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update4:*:*:*:*:*:*",
              "matchCriteriaId": "AD408C73-7D78-4EB1-AA2C-F4A6D4DC980B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update5:*:*:*:*:*:*",
              "matchCriteriaId": "513F3229-7C31-44EB-88F6-E564BE725853",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update6:*:*:*:*:*:*",
              "matchCriteriaId": "76B9CD05-A10E-439C-9FDE-EA88EC3AF2C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update7:*:*:*:*:*:*",
              "matchCriteriaId": "A7D2D415-36AA-41B2-8FD9-21A98CDFE1EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
              "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update10:*:*:*:*:*:*",
              "matchCriteriaId": "C7B02106-D5EA-4A59-A959-CCE2AC8F55BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update11:*:*:*:*:*:*",
              "matchCriteriaId": "80204464-5DC5-4A52-B844-C833A96E6BD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update12:*:*:*:*:*:*",
              "matchCriteriaId": "6F8A5D02-0B45-4DA9-ACD8-42C1BFF62827",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update13:*:*:*:*:*:*",
              "matchCriteriaId": "38DA7C99-AC2C-4B9A-B611-4697159E1D79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update14:*:*:*:*:*:*",
              "matchCriteriaId": "F264AD07-D105-4F00-8920-6D8146E4FA63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update15:*:*:*:*:*:*",
              "matchCriteriaId": "C929CF16-4725-492A-872B-0928FE388FC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update16:*:*:*:*:*:*",
              "matchCriteriaId": "1B8750A1-E481-48D4-84F4-97D1ABE15B46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update17:*:*:*:*:*:*",
              "matchCriteriaId": "454F8410-D9AC-481E-841C-60F0DF2CC25E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update18:*:*:*:*:*:*",
              "matchCriteriaId": "D1A442EE-460F-4823-B9EF-4421050F0847",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update19:*:*:*:*:*:*",
              "matchCriteriaId": "608B205D-0B79-4D1C-B2C1-64C31DB1896E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update2:*:*:*:*:*:*",
              "matchCriteriaId": "10B863B8-201D-494C-8175-168820996174",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update20:*:*:*:*:*:*",
              "matchCriteriaId": "4427DC78-E80C-4057-A295-B0731437A99E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update21:*:*:*:*:*:*",
              "matchCriteriaId": "22B6B8C1-1FF3-41BC-9576-16193AE20CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update22:*:*:*:*:*:*",
              "matchCriteriaId": "DDA17F24-1A7E-4BEB-9C98-41761A2A36A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update23:*:*:*:*:*:*",
              "matchCriteriaId": "3B062851-CE6B-44F4-8222-422EC9872EC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update24:*:*:*:*:*:*",
              "matchCriteriaId": "D4687FDA-0078-4E89-ADD8-7EDDA68261A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update25:*:*:*:*:*:*",
              "matchCriteriaId": "7EA29B09-CC24-4063-96A5-96AA08C0886D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update26:*:*:*:*:*:*",
              "matchCriteriaId": "331FC246-D3E9-4711-B305-BE51BF743CF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update3:*:*:*:*:*:*",
              "matchCriteriaId": "CBF766CE-CBB8-472A-BAF0-BD39A7BCB4DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update4:*:*:*:*:*:*",
              "matchCriteriaId": "182FAA46-D9FB-4170-B305-BAD0DF6E5DE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update5:*:*:*:*:*:*",
              "matchCriteriaId": "DF1BB9E6-D690-4C12-AEF0-4BD712869CBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update6:*:*:*:*:*:*",
              "matchCriteriaId": "653A0452-070F-4312-B94A-F5BCB01B9BDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update7:*:*:*:*:*:*",
              "matchCriteriaId": "15B67345-D0AF-4BFD-A62D-870F75306A4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update8:*:*:*:*:*:*",
              "matchCriteriaId": "DE1F4262-A054-48CC-BF1D-AA77A94FFFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update9:*:*:*:*:*:*",
              "matchCriteriaId": "D176CECA-2821-49EA-86EC-1184C133C0A3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "User enumeration vulnerability in Liferay Portal 7.2.0 through 7.4.3.26, and older unsupported versions, and Liferay DXP 7.4 before update 27, 7.3 before update 8, 7.2 before fix pack 20, and older unsupported versions allows remote attackers to determine if an account exist in the application by comparing the request\u0027s response time."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de enumeraci\u00f3n de usuarios en Liferay Portal 7.2.0 a 7.4.3.26 y versiones anteriores no soportadas, y Liferay DXP 7.4 antes de la actualizaci\u00f3n 27, 7.3 antes de la actualizaci\u00f3n 8, 7.2 antes del fixpack 20 y versiones anteriores no soportadas permite a atacantes remotos determinar si una cuenta existen en la aplicaci\u00f3n comparando el tiempo de respuesta de la solicitud."
    }
  ],
  "id": "CVE-2024-26268",
  "lastModified": "2025-01-28T21:37:57.970",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-20T14:15:09.350",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-26268"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-26268"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-203"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-203"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-11-15 01:15
Modified
2024-11-21 07:24
Summary
A Zip slip vulnerability in the Elasticsearch Connector in Liferay Portal 7.3.3 through 7.4.3.18, and Liferay DXP 7.3 before update 6, and 7.4 before update 19 allows attackers to create or overwrite existing files on the filesystem via the installation of a malicious Elasticsearch Sidecar plugin.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF1ADF5F-68DA-47D9-A6D9-16F8207525BB",
              "versionEndExcluding": "7.4.3.19",
              "versionStartIncluding": "7.3.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A Zip slip vulnerability in the Elasticsearch Connector in Liferay Portal 7.3.3 through 7.4.3.18, and Liferay DXP 7.3 before update 6, and 7.4 before update 19 allows attackers to create or overwrite existing files on the filesystem via the installation of a malicious Elasticsearch Sidecar plugin."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad Zip slip en Elasticsearch Connector en Liferay Portal 7.3.3 a 7.4.3.18, y Liferay DXP 7.3 antes de la actualizaci\u00f3n 6 y 7.4 antes de la actualizaci\u00f3n 19 permite a los atacantes crear o sobrescribir archivos existentes en el sistema de archivos mediante la instalaci\u00f3n maliciosa del complemento Elasticsearch Sidecar."
    }
  ],
  "id": "CVE-2022-42123",
  "lastModified": "2024-11-21T07:24:24.557",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-11-15T01:15:13.053",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://issues.liferay.com/browse/LPE-17518"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42123"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://issues.liferay.com/browse/LPE-17518"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42123"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-20 07:15
Modified
2025-01-28 21:34
Summary
Open redirect vulnerability in adaptive media administration page in Liferay DXP 2023.Q3 before patch 6, and 7.4 GA through update 92 allows remote attackers to redirect users to arbitrary external URLs via the _com_liferay_adaptive_media_web_portlet_AMPortlet_redirect parameter.
Impacted products
Vendor Product Version
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 2023.q3.0
liferay digital_experience_platform 2023.q3.1
liferay digital_experience_platform 2023.q3.2
liferay digital_experience_platform 2023.q3.3
liferay digital_experience_platform 2023.q3.4
liferay digital_experience_platform 2023.q3.5



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
              "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update10:*:*:*:*:*:*",
              "matchCriteriaId": "C7B02106-D5EA-4A59-A959-CCE2AC8F55BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update11:*:*:*:*:*:*",
              "matchCriteriaId": "80204464-5DC5-4A52-B844-C833A96E6BD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update12:*:*:*:*:*:*",
              "matchCriteriaId": "6F8A5D02-0B45-4DA9-ACD8-42C1BFF62827",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update13:*:*:*:*:*:*",
              "matchCriteriaId": "38DA7C99-AC2C-4B9A-B611-4697159E1D79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update14:*:*:*:*:*:*",
              "matchCriteriaId": "F264AD07-D105-4F00-8920-6D8146E4FA63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update15:*:*:*:*:*:*",
              "matchCriteriaId": "C929CF16-4725-492A-872B-0928FE388FC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update16:*:*:*:*:*:*",
              "matchCriteriaId": "1B8750A1-E481-48D4-84F4-97D1ABE15B46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update17:*:*:*:*:*:*",
              "matchCriteriaId": "454F8410-D9AC-481E-841C-60F0DF2CC25E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update18:*:*:*:*:*:*",
              "matchCriteriaId": "D1A442EE-460F-4823-B9EF-4421050F0847",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update19:*:*:*:*:*:*",
              "matchCriteriaId": "608B205D-0B79-4D1C-B2C1-64C31DB1896E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update2:*:*:*:*:*:*",
              "matchCriteriaId": "10B863B8-201D-494C-8175-168820996174",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update20:*:*:*:*:*:*",
              "matchCriteriaId": "4427DC78-E80C-4057-A295-B0731437A99E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update21:*:*:*:*:*:*",
              "matchCriteriaId": "22B6B8C1-1FF3-41BC-9576-16193AE20CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update22:*:*:*:*:*:*",
              "matchCriteriaId": "DDA17F24-1A7E-4BEB-9C98-41761A2A36A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update23:*:*:*:*:*:*",
              "matchCriteriaId": "3B062851-CE6B-44F4-8222-422EC9872EC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update24:*:*:*:*:*:*",
              "matchCriteriaId": "D4687FDA-0078-4E89-ADD8-7EDDA68261A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update25:*:*:*:*:*:*",
              "matchCriteriaId": "7EA29B09-CC24-4063-96A5-96AA08C0886D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update26:*:*:*:*:*:*",
              "matchCriteriaId": "331FC246-D3E9-4711-B305-BE51BF743CF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update27:*:*:*:*:*:*",
              "matchCriteriaId": "A5823BC0-8C11-4C31-9E99-3C9D82918E2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update28:*:*:*:*:*:*",
              "matchCriteriaId": "E2E6CB66-1AE1-4626-8070-64C250ED8363",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update29:*:*:*:*:*:*",
              "matchCriteriaId": "B63449AA-6831-4290-B1FA-0BB806820402",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update3:*:*:*:*:*:*",
              "matchCriteriaId": "CBF766CE-CBB8-472A-BAF0-BD39A7BCB4DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update30:*:*:*:*:*:*",
              "matchCriteriaId": "B3B169F6-B8B8-4612-AD7D-F75CC6A9297B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update31:*:*:*:*:*:*",
              "matchCriteriaId": "12D46756-D26D-4877-ACE8-1C2721908428",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update32:*:*:*:*:*:*",
              "matchCriteriaId": "5403DCEF-20C2-4568-8DF1-30804F522915",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update33:*:*:*:*:*:*",
              "matchCriteriaId": "90E39742-90BE-4DEB-AB78-F9B8F7333F9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update34:*:*:*:*:*:*",
              "matchCriteriaId": "9D07DB20-9DCF-4C05-99D2-F6B37A082C14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update35:*:*:*:*:*:*",
              "matchCriteriaId": "341D1157-8118-4BD3-A902-36E90E066706",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update36:*:*:*:*:*:*",
              "matchCriteriaId": "1AB71307-7EAA-436A-9CBC-5A94F034FB48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update37:*:*:*:*:*:*",
              "matchCriteriaId": "9446B3A5-6647-416C-92AF-7B6E0E929765",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update38:*:*:*:*:*:*",
              "matchCriteriaId": "06386C7A-CAA1-4FC4-9182-5A66342FB903",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update39:*:*:*:*:*:*",
              "matchCriteriaId": "8C84B701-B9A1-43D0-AF0C-30EDBD24CF90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update4:*:*:*:*:*:*",
              "matchCriteriaId": "182FAA46-D9FB-4170-B305-BAD0DF6E5DE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update40:*:*:*:*:*:*",
              "matchCriteriaId": "BA9AF651-D118-4437-B400-531B26BF6801",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update41:*:*:*:*:*:*",
              "matchCriteriaId": "2B256485-E289-4092-B45B-835DE12625B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update42:*:*:*:*:*:*",
              "matchCriteriaId": "119B54BD-75F4-46A4-A57D-16CFF4E12CEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update43:*:*:*:*:*:*",
              "matchCriteriaId": "A3382E2D-A414-40A1-A330-619859756A36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update44:*:*:*:*:*:*",
              "matchCriteriaId": "2E07B750-55B6-4DB6-B02B-216C2F5505A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update45:*:*:*:*:*:*",
              "matchCriteriaId": "B921E670-480F-4793-A636-3855A1654908",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update46:*:*:*:*:*:*",
              "matchCriteriaId": "62AE52FE-FB7F-4339-BDDE-E5AD235BBC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update47:*:*:*:*:*:*",
              "matchCriteriaId": "C99508DB-19E9-4832-AB38-57C61C7D68BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update48:*:*:*:*:*:*",
              "matchCriteriaId": "67F50AF8-7B0E-4D01-9EB2-C6625E9DACB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update49:*:*:*:*:*:*",
              "matchCriteriaId": "131E4E65-D997-47F1-8CB8-15CE6A60AB1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update5:*:*:*:*:*:*",
              "matchCriteriaId": "DF1BB9E6-D690-4C12-AEF0-4BD712869CBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*",
              "matchCriteriaId": "CCD1DEA0-8823-4780-B5EE-C1A2BB3C6B4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update51:*:*:*:*:*:*",
              "matchCriteriaId": "94AC684E-3C5F-4859-B6EB-42C478F9DD11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:*",
              "matchCriteriaId": "DC6FF5AB-B6E4-45D9-854B-29DEC200DA4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update53:*:*:*:*:*:*",
              "matchCriteriaId": "9855E3CB-925E-4623-A776-59422AB2FC6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update54:*:*:*:*:*:*",
              "matchCriteriaId": "01C3B7BE-1F9B-4EDA-990C-A4022CB85612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update55:*:*:*:*:*:*",
              "matchCriteriaId": "65CF766C-626D-4F8C-BDBF-F0C5404DD545",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update56:*:*:*:*:*:*",
              "matchCriteriaId": "720EF24C-9A36-405B-A380-6114C150B376",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update57:*:*:*:*:*:*",
              "matchCriteriaId": "44479EF5-40BD-43A2-AD0F-CE1660222AB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update58:*:*:*:*:*:*",
              "matchCriteriaId": "B8E0BD92-0F77-481E-8167-F81755E00703",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update59:*:*:*:*:*:*",
              "matchCriteriaId": "2BDB885E-814A-4CA8-A81C-1DB35989089B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update6:*:*:*:*:*:*",
              "matchCriteriaId": "653A0452-070F-4312-B94A-F5BCB01B9BDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update60:*:*:*:*:*:*",
              "matchCriteriaId": "B73DA1AE-C62F-4E62-AA98-5697656825F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update61:*:*:*:*:*:*",
              "matchCriteriaId": "D49DEE85-4DDB-4EF4-9F4D-11E7C1364055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update62:*:*:*:*:*:*",
              "matchCriteriaId": "365F28B6-DBF2-45BB-A06D-DD80CFBAD7BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update63:*:*:*:*:*:*",
              "matchCriteriaId": "5FDAD47C-C2DA-4533-AA58-DD6EC09A580A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update64:*:*:*:*:*:*",
              "matchCriteriaId": "5F81F36F-B20F-48B3-A1F2-3D319A34176B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update65:*:*:*:*:*:*",
              "matchCriteriaId": "754329CD-30B7-4410-A371-56A7C261B61B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update66:*:*:*:*:*:*",
              "matchCriteriaId": "C9445405-6B94-4DD1-BA94-B600AA316BB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update67:*:*:*:*:*:*",
              "matchCriteriaId": "960F3F22-9CC8-4655-9B09-777E5A5A1239",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update68:*:*:*:*:*:*",
              "matchCriteriaId": "D2B77C89-7F33-47A0-B6BF-473366033BEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update69:*:*:*:*:*:*",
              "matchCriteriaId": "8183B9D5-1C4D-4D30-BD85-13850FF34CB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update7:*:*:*:*:*:*",
              "matchCriteriaId": "15B67345-D0AF-4BFD-A62D-870F75306A4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update70:*:*:*:*:*:*",
              "matchCriteriaId": "1675366A-2388-4F7E-B423-D39BC7D3D38D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update71:*:*:*:*:*:*",
              "matchCriteriaId": "B93C3CF2-4F45-4F6C-AB6D-F9ABDA7C4DA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update72:*:*:*:*:*:*",
              "matchCriteriaId": "34A6A6A0-9307-4F5D-9605-1F786D1CD62A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update73:*:*:*:*:*:*",
              "matchCriteriaId": "6B994132-7103-4132-9D90-11CA264FEDE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update74:*:*:*:*:*:*",
              "matchCriteriaId": "A1958E04-AB8A-4B0E-AB45-B810CAED2EEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update75:*:*:*:*:*:*",
              "matchCriteriaId": "BB5558B0-6714-4B3A-B287-1943517A975A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update76:*:*:*:*:*:*",
              "matchCriteriaId": "7E325115-EEBC-41F4-8606-45270DA40B98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update77:*:*:*:*:*:*",
              "matchCriteriaId": "848B2C72-447D-46E2-A5A7-43CF3764E578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update78:*:*:*:*:*:*",
              "matchCriteriaId": "26A0AF15-52A9-46FD-8157-359141332EAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update79:*:*:*:*:*:*",
              "matchCriteriaId": "63D63872-C1D0-444F-BCC7-A514F323C256",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update8:*:*:*:*:*:*",
              "matchCriteriaId": "DE1F4262-A054-48CC-BF1D-AA77A94FFFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update80:*:*:*:*:*:*",
              "matchCriteriaId": "9D9FA9AD-39D3-412A-B794-E1B29EEEEC4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*",
              "matchCriteriaId": "294D8A56-A797-433C-A06E-106B2179151A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*",
              "matchCriteriaId": "824D88D9-4645-4CAD-8CAB-30F27DD388C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*",
              "matchCriteriaId": "F6E8C952-B455-46E4-AC3D-D38CAF189F60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*",
              "matchCriteriaId": "CD77C0EE-AC79-4443-A502-C1E02F806911",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*",
              "matchCriteriaId": "648EB53C-7A90-4DA6-BF1C-B5336CDE30C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update86:*:*:*:*:*:*",
              "matchCriteriaId": "39835EF7-8E93-4695-973D-6E9B76C67372",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update87:*:*:*:*:*:*",
              "matchCriteriaId": "2A05FB86-332B-44E3-93CB-82465A38976E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update88:*:*:*:*:*:*",
              "matchCriteriaId": "7C754823-899C-4EEF-ACB7-E1551FA88B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update89:*:*:*:*:*:*",
              "matchCriteriaId": "493D4C18-DEE2-4040-9C13-3A9AB2CE47BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update9:*:*:*:*:*:*",
              "matchCriteriaId": "D176CECA-2821-49EA-86EC-1184C133C0A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update90:*:*:*:*:*:*",
              "matchCriteriaId": "8F17DD75-E63B-4E4C-B136-D43F17B389EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update91:*:*:*:*:*:*",
              "matchCriteriaId": "62EE759A-78AD-40D6-8C5B-10403A8A4A89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update92:*:*:*:*:*:*",
              "matchCriteriaId": "865ABA1F-CA99-4602-B325-F81C9778855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7B3A5E2-23CE-45A8-BD01-77024EB9F9A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF6451A-2A5D-4222-A1C6-113AA4B8D4E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D6CE430-3C95-4855-BA44-E2E136D1FEB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "44FEB149-C792-493D-B055-568FFC96298A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B050DD73-71B6-46CD-A35B-7ACB53BE6C6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "62432289-E1DC-4013-85C7-6B77299A910F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Open redirect vulnerability in adaptive media administration page in Liferay DXP 2023.Q3 before patch 6, and 7.4 GA through update 92 allows remote attackers to redirect users to arbitrary external URLs via the _com_liferay_adaptive_media_web_portlet_AMPortlet_redirect parameter."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de redireccionamiento abierto en la p\u00e1gina de administraci\u00f3n de medios adaptables en Liferay DXP 2023.Q3 antes del parche 6 y 7.4 GA hasta la actualizaci\u00f3n 92 permite a atacantes remotos redirigir a los usuarios a URL externas arbitrarias a trav\u00e9s del par\u00e1metro _com_liferay_adaptive_media_web_portlet_AMPortlet_redirect."
    }
  ],
  "id": "CVE-2023-44308",
  "lastModified": "2025-01-28T21:34:39.347",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-20T07:15:08.033",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-44308"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-44308"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-601"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-601"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-11-15 02:15
Modified
2024-11-21 07:24
Summary
An Insecure direct object reference (IDOR) vulnerability in the Dynamic Data Mapping module in Liferay Portal 7.3.2 through 7.4.3.4, and Liferay DXP 7.3 before update 4, and 7.4 GA allows remote authenticated users to view and access form entries via the `formInstanceRecordId` parameter.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C01C7D38-BC12-4921-ADE6-799945887D66",
              "versionEndExcluding": "7.4.3.5",
              "versionStartIncluding": "7.3.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An Insecure direct object reference (IDOR) vulnerability in the Dynamic Data Mapping module in Liferay Portal 7.3.2 through 7.4.3.4, and Liferay DXP 7.3 before update 4, and 7.4 GA allows remote authenticated users to view and access form entries via the `formInstanceRecordId` parameter."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de Insecure Direct Object Reference (IDOR) en el m\u00f3dulo Dynamic Data Mapping en Liferay Portal 7.3.2 hasta 7.4.3.4, y Liferay DXP 7.3 antes de la actualizaci\u00f3n 4, y 7.4 GA permite a usuarios remotos autenticados ver y acceder a entradas de formulario a trav\u00e9s del par\u00e1metro `formInstanceRecordId`."
    }
  ],
  "id": "CVE-2022-42129",
  "lastModified": "2024-11-21T07:24:25.490",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-11-15T02:15:11.590",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://issues.liferay.com/browse/LPE-17448"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42129"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://issues.liferay.com/browse/LPE-17448"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42129"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-639"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-21 03:15
Modified
2025-01-28 02:33
Summary
Multiple stored cross-site scripting (XSS) vulnerabilities in Liferay Portal 7.2.0 through 7.4.3.13, and older unsupported versions, and Liferay DXP 7.4 before update 10, 7.3 before update 4, 7.2 before fix pack 17, and older unsupported versions allow remote authenticated users to inject arbitrary web script or HTML via a crafted payload injected into the first/middle/last name text field of the user who creates an entry in the (1) Announcement widget, or (2) Alerts widget.
Impacted products
Vendor Product Version
liferay liferay_portal *
liferay digital_experience_platform *
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "06CB4060-B2DE-4D8B-8776-568C44BB517C",
              "versionEndExcluding": "7.4.3.14",
              "versionStartIncluding": "7.2.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459",
              "versionEndExcluding": "7.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "311EE92A-0EEF-4556-A52F-E6C9522FA2DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "49501C9E-D12A-45E0-92F3-8FD5FDC6D3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "43F61E2F-4643-4D5D-84DB-7B7B6E93C67B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "8B057D81-7589-4007-9A0D-2D302B82F9CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "6F0F2558-6990-43D7-9FE2-8E99D81B8269",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "11072673-C3AB-42EA-A26F-890DEE903D42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "134560B0-9746-4EC3-8DE3-26E53E2CAC6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "728DF154-F19F-454C-87CA-1E755107F2A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
              "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update2:*:*:*:*:*:*",
              "matchCriteriaId": "10B863B8-201D-494C-8175-168820996174",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update3:*:*:*:*:*:*",
              "matchCriteriaId": "CBF766CE-CBB8-472A-BAF0-BD39A7BCB4DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update4:*:*:*:*:*:*",
              "matchCriteriaId": "182FAA46-D9FB-4170-B305-BAD0DF6E5DE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update5:*:*:*:*:*:*",
              "matchCriteriaId": "DF1BB9E6-D690-4C12-AEF0-4BD712869CBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update6:*:*:*:*:*:*",
              "matchCriteriaId": "653A0452-070F-4312-B94A-F5BCB01B9BDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update7:*:*:*:*:*:*",
              "matchCriteriaId": "15B67345-D0AF-4BFD-A62D-870F75306A4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update8:*:*:*:*:*:*",
              "matchCriteriaId": "DE1F4262-A054-48CC-BF1D-AA77A94FFFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update9:*:*:*:*:*:*",
              "matchCriteriaId": "D176CECA-2821-49EA-86EC-1184C133C0A3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple stored cross-site scripting (XSS) vulnerabilities in Liferay Portal 7.2.0 through 7.4.3.13, and older unsupported versions, and Liferay DXP 7.4 before update 10, 7.3 before update 4, 7.2 before fix pack 17, and older unsupported versions allow remote authenticated users to inject arbitrary web script or HTML via a crafted payload injected into the first/middle/last name text field of the user who creates an entry in the (1) Announcement widget, or (2) Alerts widget."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de Cross-site scripting (XSS) almacenadas en Liferay Portal 7.2.0 a 7.4.3.13 y versiones anteriores no compatibles, y Liferay DXP 7.4 antes de la actualizaci\u00f3n 10, 7.3 antes de la actualizaci\u00f3n 4, 7.2 antes del fixpack 17 y versiones anteriores no compatibles permiten usuarios autenticados remotamente para inyectar script web o HTML arbitrario a trav\u00e9s de un payload manipulado inyectado en el campo de texto del nombre/segundo nombre/apellido del usuario que crea una entrada en el (1) widget de anuncio o (2) widget de alertas."
    }
  ],
  "id": "CVE-2024-26266",
  "lastModified": "2025-01-28T02:33:22.940",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.0,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 6.0,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-21T03:15:09.353",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-26266"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-26266"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-20 13:15
Modified
2024-12-11 17:53
Summary
In Liferay Portal 7.2.0 through 7.4.3.12, and older unsupported versions, and Liferay DXP 7.4 before update 9, 7.3 before update 4, 7.2 before fix pack 19, and older unsupported versions, the default configuration does not sanitize blog entries of JavaScript, which allows remote authenticated users to inject arbitrary web script or HTML (XSS) via a crafted payload injected into a blog entry’s content text field.
Impacted products
Vendor Product Version
liferay digital_experience_platform *
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay liferay_portal *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459",
              "versionEndExcluding": "7.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "311EE92A-0EEF-4556-A52F-E6C9522FA2DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "49501C9E-D12A-45E0-92F3-8FD5FDC6D3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_17:*:*:*:*:*:*",
              "matchCriteriaId": "F2B55C77-9FAA-4E14-8CEF-9C4CAC804007",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_18:*:*:*:*:*:*",
              "matchCriteriaId": "54E499E6-C747-476B-BFE2-C04D9F8744F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "43F61E2F-4643-4D5D-84DB-7B7B6E93C67B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "8B057D81-7589-4007-9A0D-2D302B82F9CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "6F0F2558-6990-43D7-9FE2-8E99D81B8269",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "11072673-C3AB-42EA-A26F-890DEE903D42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "134560B0-9746-4EC3-8DE3-26E53E2CAC6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "71E41E59-D71F-48F0-812B-39D59F81997B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "728DF154-F19F-454C-87CA-1E755107F2A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
              "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update2:*:*:*:*:*:*",
              "matchCriteriaId": "10B863B8-201D-494C-8175-168820996174",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update3:*:*:*:*:*:*",
              "matchCriteriaId": "CBF766CE-CBB8-472A-BAF0-BD39A7BCB4DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update4:*:*:*:*:*:*",
              "matchCriteriaId": "182FAA46-D9FB-4170-B305-BAD0DF6E5DE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update5:*:*:*:*:*:*",
              "matchCriteriaId": "DF1BB9E6-D690-4C12-AEF0-4BD712869CBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update6:*:*:*:*:*:*",
              "matchCriteriaId": "653A0452-070F-4312-B94A-F5BCB01B9BDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update7:*:*:*:*:*:*",
              "matchCriteriaId": "15B67345-D0AF-4BFD-A62D-870F75306A4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update8:*:*:*:*:*:*",
              "matchCriteriaId": "DE1F4262-A054-48CC-BF1D-AA77A94FFFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F2855EC-0F83-4119-95BB-709C414D7E05",
              "versionEndExcluding": "7.4.3.13",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Liferay Portal 7.2.0 through 7.4.3.12, and older unsupported versions, and Liferay DXP 7.4 before update 9, 7.3 before update 4, 7.2 before fix pack 19, and older unsupported versions, the default configuration does not sanitize blog entries of JavaScript, which allows remote authenticated users to inject arbitrary web script or HTML (XSS) via a crafted payload injected into a blog entry\u2019s content text field."
    },
    {
      "lang": "es",
      "value": "En Liferay Portal 7.2.0 a 7.4.3.12 y versiones anteriores no compatibles, y Liferay DXP 7.4 antes de la actualizaci\u00f3n 9, 7.3 antes de la actualizaci\u00f3n 4, 7.2 antes del fixpack 19 y versiones anteriores no compatibles, la configuraci\u00f3n predeterminada no sanitiza las entradas del blog de JavaScript , que permite a usuarios remotos autenticados inyectar script web o HTML (XSS) arbitrarios mediante un payload manipulado que se inyecto en el campo de texto de contenido de una entrada de blog."
    }
  ],
  "id": "CVE-2024-25610",
  "lastModified": "2024-12-11T17:53:18.093",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.0,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 6.0,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-20T13:15:08.493",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25610"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25610"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-1188"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-1188"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-05-24 14:15
Modified
2024-11-21 08:06
Summary
Cross-site scripting (XSS) vulnerability in IFrame type Remote Apps in Liferay Portal 7.4.0 through 7.4.3.30, and Liferay DXP 7.4 before update 31 allows remote attackers to inject arbitrary web script or HTML via the Remote App's IFrame URL.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
              "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0144D43C-D0E8-4D25-A6AC-81CFD2278DFB",
              "versionEndIncluding": "7.4.3.30",
              "versionStartIncluding": "7.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in IFrame type Remote Apps in Liferay Portal 7.4.0 through 7.4.3.30, and Liferay DXP 7.4 before update 31 allows remote attackers to inject arbitrary web script or HTML via the Remote App\u0027s IFrame URL."
    }
  ],
  "id": "CVE-2023-33940",
  "lastModified": "2024-11-21T08:06:14.857",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.7,
        "impactScore": 2.7,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-05-24T14:15:09.697",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33940"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33940"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-03-03 00:15
Modified
2024-11-21 06:16
Summary
Cross-site scripting (XSS) vulnerability in the Asset module in Liferay Portal 7.3.4 through 7.3.6 allow remote attackers to inject arbitrary web script or HTML when creating a collection page via the _com_liferay_asset_list_web_portlet_AssetListPortlet_title parameter.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "268D0391-AFD2-4AE1-810E-C28046F9FF65",
              "versionEndIncluding": "7.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F7687E8-644C-432E-8AC2-70C913C077D9",
              "versionEndIncluding": "7.3.6",
              "versionStartIncluding": "7.3.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the Asset module in Liferay Portal 7.3.4 through 7.3.6 allow remote attackers to inject arbitrary web script or HTML when creating a collection page via the _com_liferay_asset_list_web_portlet_AssetListPortlet_title parameter."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el m\u00f3dulo Asset de Liferay Portal 7.3.4 a 7.3.6 permite a los atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios al crear una p\u00e1gina de colecci\u00f3n a trav\u00e9s del par\u00e1metro _com_liferay_asset_list_web_portlet_AssetListPortlet_title"
    }
  ],
  "id": "CVE-2021-38265",
  "lastModified": "2024-11-21T06:16:42.237",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-03-03T00:15:08.020",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Product"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38265-stored-xss-with-collection-name"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Product"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38265-stored-xss-with-collection-name"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-10-17 08:15
Modified
2024-11-21 08:22
Summary
Reflected cross-site scripting (XSS) vulnerability on the Export for Translation page in Liferay Portal 7.4.3.4 through 7.4.3.85, and Liferay DXP 7.4 before update 86 allows remote attackers to inject arbitrary web script or HTML via the `_com_liferay_translation_web_internal_portlet_TranslationPortlet_redirect` parameter.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
              "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update21:*:*:*:*:*:*",
              "matchCriteriaId": "22B6B8C1-1FF3-41BC-9576-16193AE20CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update34:*:*:*:*:*:*",
              "matchCriteriaId": "9D07DB20-9DCF-4C05-99D2-F6B37A082C14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update36:*:*:*:*:*:*",
              "matchCriteriaId": "1AB71307-7EAA-436A-9CBC-5A94F034FB48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update41:*:*:*:*:*:*",
              "matchCriteriaId": "2B256485-E289-4092-B45B-835DE12625B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update48:*:*:*:*:*:*",
              "matchCriteriaId": "67F50AF8-7B0E-4D01-9EB2-C6625E9DACB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*",
              "matchCriteriaId": "CCD1DEA0-8823-4780-B5EE-C1A2BB3C6B4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:*",
              "matchCriteriaId": "DC6FF5AB-B6E4-45D9-854B-29DEC200DA4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update62:*:*:*:*:*:*",
              "matchCriteriaId": "365F28B6-DBF2-45BB-A06D-DD80CFBAD7BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update67:*:*:*:*:*:*",
              "matchCriteriaId": "960F3F22-9CC8-4655-9B09-777E5A5A1239",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update76:*:*:*:*:*:*",
              "matchCriteriaId": "7E325115-EEBC-41F4-8606-45270DA40B98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*",
              "matchCriteriaId": "294D8A56-A797-433C-A06E-106B2179151A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*",
              "matchCriteriaId": "824D88D9-4645-4CAD-8CAB-30F27DD388C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*",
              "matchCriteriaId": "F6E8C952-B455-46E4-AC3D-D38CAF189F60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*",
              "matchCriteriaId": "CD77C0EE-AC79-4443-A502-C1E02F806911",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*",
              "matchCriteriaId": "648EB53C-7A90-4DA6-BF1C-B5336CDE30C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "33B0E975-ED31-45BF-AE6F-D614E03A1F40",
              "versionEndExcluding": "7.4.3.86",
              "versionStartIncluding": "7.4.3.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Reflected cross-site scripting (XSS) vulnerability on the Export for Translation page in Liferay Portal 7.4.3.4 through 7.4.3.85, and Liferay DXP 7.4 before update 86 allows remote attackers to inject arbitrary web script or HTML via the `_com_liferay_translation_web_internal_portlet_TranslationPortlet_redirect` parameter.\n"
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de Cross-Site Scripting (XSS) reflejada en la p\u00e1gina \"Export for Translation\" en Liferay Portal 7.4.3.4 hasta 7.4.3.85, y Liferay DXP 7.4 anterior a la actualizaci\u00f3n 86 permite a atacantes remotos inyectar script web o HTML arbitrario a trav\u00e9s del par\u00e1metro `_com_liferay_translation_web_internal_portlet_TranslationPortlet_redirect`."
    }
  ],
  "id": "CVE-2023-42497",
  "lastModified": "2024-11-21T08:22:40.480",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.6,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 6.0,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-10-17T08:15:09.437",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-42497"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-42497"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-20 13:15
Modified
2025-01-28 21:36
Summary
In Liferay Portal 7.2.0 through 7.4.3.25, and older unsupported versions, and Liferay DXP 7.4 before update 26, 7.3 before update 5, 7.2 before fix pack 19, and older unsupported versions the default value of the portal property `http.header.version.verbosity` is set to `full`, which allows remote attackers to easily identify the version of the application that is running and the vulnerabilities that affect that version via 'Liferay-Portal` response header.
Impacted products
Vendor Product Version
liferay liferay_portal *
liferay liferay_portal *
liferay digital_experience_platform *
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1BD676-9B8D-44B0-9EAA-777EC43859DB",
              "versionEndIncluding": "7.3.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC7C6A95-F6F4-40F0-AEB7-66A575A949EE",
              "versionEndExcluding": "7.4.3.26",
              "versionStartIncluding": "7.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459",
              "versionEndExcluding": "7.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "311EE92A-0EEF-4556-A52F-E6C9522FA2DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "49501C9E-D12A-45E0-92F3-8FD5FDC6D3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_17:*:*:*:*:*:*",
              "matchCriteriaId": "F2B55C77-9FAA-4E14-8CEF-9C4CAC804007",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_18:*:*:*:*:*:*",
              "matchCriteriaId": "54E499E6-C747-476B-BFE2-C04D9F8744F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "43F61E2F-4643-4D5D-84DB-7B7B6E93C67B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "8B057D81-7589-4007-9A0D-2D302B82F9CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "6F0F2558-6990-43D7-9FE2-8E99D81B8269",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "11072673-C3AB-42EA-A26F-890DEE903D42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "134560B0-9746-4EC3-8DE3-26E53E2CAC6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "71E41E59-D71F-48F0-812B-39D59F81997B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "728DF154-F19F-454C-87CA-1E755107F2A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update4:*:*:*:*:*:*",
              "matchCriteriaId": "AD408C73-7D78-4EB1-AA2C-F4A6D4DC980B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
              "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update10:*:*:*:*:*:*",
              "matchCriteriaId": "C7B02106-D5EA-4A59-A959-CCE2AC8F55BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update11:*:*:*:*:*:*",
              "matchCriteriaId": "80204464-5DC5-4A52-B844-C833A96E6BD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update12:*:*:*:*:*:*",
              "matchCriteriaId": "6F8A5D02-0B45-4DA9-ACD8-42C1BFF62827",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update13:*:*:*:*:*:*",
              "matchCriteriaId": "38DA7C99-AC2C-4B9A-B611-4697159E1D79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update14:*:*:*:*:*:*",
              "matchCriteriaId": "F264AD07-D105-4F00-8920-6D8146E4FA63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update15:*:*:*:*:*:*",
              "matchCriteriaId": "C929CF16-4725-492A-872B-0928FE388FC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update16:*:*:*:*:*:*",
              "matchCriteriaId": "1B8750A1-E481-48D4-84F4-97D1ABE15B46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update17:*:*:*:*:*:*",
              "matchCriteriaId": "454F8410-D9AC-481E-841C-60F0DF2CC25E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update18:*:*:*:*:*:*",
              "matchCriteriaId": "D1A442EE-460F-4823-B9EF-4421050F0847",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update19:*:*:*:*:*:*",
              "matchCriteriaId": "608B205D-0B79-4D1C-B2C1-64C31DB1896E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update2:*:*:*:*:*:*",
              "matchCriteriaId": "10B863B8-201D-494C-8175-168820996174",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update20:*:*:*:*:*:*",
              "matchCriteriaId": "4427DC78-E80C-4057-A295-B0731437A99E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update21:*:*:*:*:*:*",
              "matchCriteriaId": "22B6B8C1-1FF3-41BC-9576-16193AE20CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update22:*:*:*:*:*:*",
              "matchCriteriaId": "DDA17F24-1A7E-4BEB-9C98-41761A2A36A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update23:*:*:*:*:*:*",
              "matchCriteriaId": "3B062851-CE6B-44F4-8222-422EC9872EC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update24:*:*:*:*:*:*",
              "matchCriteriaId": "D4687FDA-0078-4E89-ADD8-7EDDA68261A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update25:*:*:*:*:*:*",
              "matchCriteriaId": "7EA29B09-CC24-4063-96A5-96AA08C0886D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update3:*:*:*:*:*:*",
              "matchCriteriaId": "CBF766CE-CBB8-472A-BAF0-BD39A7BCB4DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update4:*:*:*:*:*:*",
              "matchCriteriaId": "182FAA46-D9FB-4170-B305-BAD0DF6E5DE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update5:*:*:*:*:*:*",
              "matchCriteriaId": "DF1BB9E6-D690-4C12-AEF0-4BD712869CBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update6:*:*:*:*:*:*",
              "matchCriteriaId": "653A0452-070F-4312-B94A-F5BCB01B9BDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update7:*:*:*:*:*:*",
              "matchCriteriaId": "15B67345-D0AF-4BFD-A62D-870F75306A4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update8:*:*:*:*:*:*",
              "matchCriteriaId": "DE1F4262-A054-48CC-BF1D-AA77A94FFFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update9:*:*:*:*:*:*",
              "matchCriteriaId": "D176CECA-2821-49EA-86EC-1184C133C0A3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Liferay Portal 7.2.0 through 7.4.3.25, and older unsupported versions, and Liferay DXP 7.4 before update 26, 7.3 before update 5, 7.2 before fix pack 19, and older unsupported versions the default value of the portal property `http.header.version.verbosity` is set to `full`, which allows remote attackers to easily identify the version of the application that is running and the vulnerabilities that affect that version via \u0027Liferay-Portal` response header."
    },
    {
      "lang": "es",
      "value": "En Liferay Portal 7.2.0 a 7.4.3.25 y versiones anteriores no compatibles, y Liferay DXP 7.4 antes de la actualizaci\u00f3n 26, 7.3 antes de la actualizaci\u00f3n 5, 7.2 antes del fixpack 19 y versiones anteriores no compatibles, el valor predeterminado de la propiedad del portal `http.header.version.verbosity` est\u00e1 configurado en `full`, lo que permite a atacantes remotos identificar f\u00e1cilmente la versi\u00f3n de la aplicaci\u00f3n que se est\u00e1 ejecutando y las vulnerabilidades que afectan a esa versi\u00f3n a trav\u00e9s del encabezado de respuesta \u0027Liferay-Portal`."
    }
  ],
  "id": "CVE-2024-26267",
  "lastModified": "2025-01-28T21:36:47.403",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-20T13:15:08.843",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-26267"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-26267"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-1188"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-1188"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-05-24 17:15
Modified
2024-11-21 08:06
Summary
In Liferay Portal 7.3.0 and earlier, and Liferay DXP 7.2 and earlier the default configuration does not require users to verify their email address, which allows remote attackers to create accounts using fake email addresses or email addresses which they don't control. The portal property `company.security.strangers.verify` should be set to true.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4614C87F-F39C-4ADD-A7A2-4A498612AD38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "27DF695E-B890-42C2-8941-5BB53154755F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "39BA38ED-FF39-4795-9313-F920D16DD629",
              "versionEndIncluding": "7.3.0",
              "versionStartIncluding": "7.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Liferay Portal 7.3.0 and earlier, and Liferay DXP 7.2 and earlier the default configuration does not require users to verify their email address, which allows remote attackers to create accounts using fake email addresses or email addresses which they don\u0027t control. The portal property `company.security.strangers.verify` should be set to true."
    }
  ],
  "id": "CVE-2023-33949",
  "lastModified": "2024-11-21T08:06:16.403",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-05-24T17:15:09.933",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33949"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33949"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-1188"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-1188"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-11-15 01:15
Modified
2024-11-21 07:24
Summary
Zip slip vulnerability in FileUtil.unzip in Liferay Portal 7.4.3.5 through 7.4.3.35 and Liferay DXP 7.4 update 1 through update 34 allows attackers to create or overwrite existing files on the filesystem via the deployment of a malicious plugin/module.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
              "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update34:*:*:*:*:*:*",
              "matchCriteriaId": "9D07DB20-9DCF-4C05-99D2-F6B37A082C14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8D5371D-B65B-4EBC-A6D5-823AD1EB3EE5",
              "versionEndExcluding": "7.4.3.36",
              "versionStartIncluding": "7.4.3.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Zip slip vulnerability in FileUtil.unzip in Liferay Portal 7.4.3.5 through 7.4.3.35 and Liferay DXP 7.4 update 1 through update 34 allows attackers to create or overwrite existing files on the filesystem via the deployment of a malicious plugin/module."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de deslizamiento de zip en FileUtil.unzip en Liferay Portal 7.4.3.5 hasta 7.4.3.35 y Liferay DXP 7.4 actualizaci\u00f3n 1 hasta la actualizaci\u00f3n 34 permite a los atacantes crear o sobrescribir archivos existentes en el sistema de archivos mediante la implementaci\u00f3n de un complemento/m\u00f3dulo malicioso."
    }
  ],
  "id": "CVE-2022-42125",
  "lastModified": "2024-11-21T07:24:24.877",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-11-15T01:15:13.200",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://issues.liferay.com/browse/LPE-17517"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42125"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://issues.liferay.com/browse/LPE-17517"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42125"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-21 03:15
Modified
2025-01-28 02:47
Summary
Reflected cross-site scripting (XSS) vulnerability in the Language Override edit screen in Liferay Portal 7.4.3.8 through 7.4.3.97, and Liferay DXP 2023.Q3 before patch 5, and 7.4 update 4 through 92 allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_portal_language_override_web_internal_portlet_PLOPortlet_key parameter.
Impacted products
Vendor Product Version
liferay liferay_portal *
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 2023.q3.0
liferay digital_experience_platform 2023.q3.1
liferay digital_experience_platform 2023.q3.2
liferay digital_experience_platform 2023.q3.3
liferay digital_experience_platform 2023.q3.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "46868AAC-0BA9-43AB-9E7C-4080AFE04DF7",
              "versionEndExcluding": "7.4.3.98",
              "versionStartIncluding": "7.4.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update10:*:*:*:*:*:*",
              "matchCriteriaId": "C7B02106-D5EA-4A59-A959-CCE2AC8F55BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update11:*:*:*:*:*:*",
              "matchCriteriaId": "80204464-5DC5-4A52-B844-C833A96E6BD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update12:*:*:*:*:*:*",
              "matchCriteriaId": "6F8A5D02-0B45-4DA9-ACD8-42C1BFF62827",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update13:*:*:*:*:*:*",
              "matchCriteriaId": "38DA7C99-AC2C-4B9A-B611-4697159E1D79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update14:*:*:*:*:*:*",
              "matchCriteriaId": "F264AD07-D105-4F00-8920-6D8146E4FA63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update15:*:*:*:*:*:*",
              "matchCriteriaId": "C929CF16-4725-492A-872B-0928FE388FC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update16:*:*:*:*:*:*",
              "matchCriteriaId": "1B8750A1-E481-48D4-84F4-97D1ABE15B46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update17:*:*:*:*:*:*",
              "matchCriteriaId": "454F8410-D9AC-481E-841C-60F0DF2CC25E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update18:*:*:*:*:*:*",
              "matchCriteriaId": "D1A442EE-460F-4823-B9EF-4421050F0847",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update19:*:*:*:*:*:*",
              "matchCriteriaId": "608B205D-0B79-4D1C-B2C1-64C31DB1896E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update20:*:*:*:*:*:*",
              "matchCriteriaId": "4427DC78-E80C-4057-A295-B0731437A99E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update21:*:*:*:*:*:*",
              "matchCriteriaId": "22B6B8C1-1FF3-41BC-9576-16193AE20CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update22:*:*:*:*:*:*",
              "matchCriteriaId": "DDA17F24-1A7E-4BEB-9C98-41761A2A36A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update23:*:*:*:*:*:*",
              "matchCriteriaId": "3B062851-CE6B-44F4-8222-422EC9872EC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update24:*:*:*:*:*:*",
              "matchCriteriaId": "D4687FDA-0078-4E89-ADD8-7EDDA68261A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update25:*:*:*:*:*:*",
              "matchCriteriaId": "7EA29B09-CC24-4063-96A5-96AA08C0886D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update26:*:*:*:*:*:*",
              "matchCriteriaId": "331FC246-D3E9-4711-B305-BE51BF743CF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update27:*:*:*:*:*:*",
              "matchCriteriaId": "A5823BC0-8C11-4C31-9E99-3C9D82918E2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update28:*:*:*:*:*:*",
              "matchCriteriaId": "E2E6CB66-1AE1-4626-8070-64C250ED8363",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update29:*:*:*:*:*:*",
              "matchCriteriaId": "B63449AA-6831-4290-B1FA-0BB806820402",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update30:*:*:*:*:*:*",
              "matchCriteriaId": "B3B169F6-B8B8-4612-AD7D-F75CC6A9297B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update31:*:*:*:*:*:*",
              "matchCriteriaId": "12D46756-D26D-4877-ACE8-1C2721908428",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update32:*:*:*:*:*:*",
              "matchCriteriaId": "5403DCEF-20C2-4568-8DF1-30804F522915",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update33:*:*:*:*:*:*",
              "matchCriteriaId": "90E39742-90BE-4DEB-AB78-F9B8F7333F9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update34:*:*:*:*:*:*",
              "matchCriteriaId": "9D07DB20-9DCF-4C05-99D2-F6B37A082C14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update35:*:*:*:*:*:*",
              "matchCriteriaId": "341D1157-8118-4BD3-A902-36E90E066706",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update36:*:*:*:*:*:*",
              "matchCriteriaId": "1AB71307-7EAA-436A-9CBC-5A94F034FB48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update37:*:*:*:*:*:*",
              "matchCriteriaId": "9446B3A5-6647-416C-92AF-7B6E0E929765",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update38:*:*:*:*:*:*",
              "matchCriteriaId": "06386C7A-CAA1-4FC4-9182-5A66342FB903",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update39:*:*:*:*:*:*",
              "matchCriteriaId": "8C84B701-B9A1-43D0-AF0C-30EDBD24CF90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update4:*:*:*:*:*:*",
              "matchCriteriaId": "182FAA46-D9FB-4170-B305-BAD0DF6E5DE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update40:*:*:*:*:*:*",
              "matchCriteriaId": "BA9AF651-D118-4437-B400-531B26BF6801",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update41:*:*:*:*:*:*",
              "matchCriteriaId": "2B256485-E289-4092-B45B-835DE12625B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update42:*:*:*:*:*:*",
              "matchCriteriaId": "119B54BD-75F4-46A4-A57D-16CFF4E12CEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update43:*:*:*:*:*:*",
              "matchCriteriaId": "A3382E2D-A414-40A1-A330-619859756A36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update44:*:*:*:*:*:*",
              "matchCriteriaId": "2E07B750-55B6-4DB6-B02B-216C2F5505A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update45:*:*:*:*:*:*",
              "matchCriteriaId": "B921E670-480F-4793-A636-3855A1654908",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update46:*:*:*:*:*:*",
              "matchCriteriaId": "62AE52FE-FB7F-4339-BDDE-E5AD235BBC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update47:*:*:*:*:*:*",
              "matchCriteriaId": "C99508DB-19E9-4832-AB38-57C61C7D68BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update48:*:*:*:*:*:*",
              "matchCriteriaId": "67F50AF8-7B0E-4D01-9EB2-C6625E9DACB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update49:*:*:*:*:*:*",
              "matchCriteriaId": "131E4E65-D997-47F1-8CB8-15CE6A60AB1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update5:*:*:*:*:*:*",
              "matchCriteriaId": "DF1BB9E6-D690-4C12-AEF0-4BD712869CBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*",
              "matchCriteriaId": "CCD1DEA0-8823-4780-B5EE-C1A2BB3C6B4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update51:*:*:*:*:*:*",
              "matchCriteriaId": "94AC684E-3C5F-4859-B6EB-42C478F9DD11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:*",
              "matchCriteriaId": "DC6FF5AB-B6E4-45D9-854B-29DEC200DA4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update53:*:*:*:*:*:*",
              "matchCriteriaId": "9855E3CB-925E-4623-A776-59422AB2FC6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update54:*:*:*:*:*:*",
              "matchCriteriaId": "01C3B7BE-1F9B-4EDA-990C-A4022CB85612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update55:*:*:*:*:*:*",
              "matchCriteriaId": "65CF766C-626D-4F8C-BDBF-F0C5404DD545",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update56:*:*:*:*:*:*",
              "matchCriteriaId": "720EF24C-9A36-405B-A380-6114C150B376",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update57:*:*:*:*:*:*",
              "matchCriteriaId": "44479EF5-40BD-43A2-AD0F-CE1660222AB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update58:*:*:*:*:*:*",
              "matchCriteriaId": "B8E0BD92-0F77-481E-8167-F81755E00703",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update59:*:*:*:*:*:*",
              "matchCriteriaId": "2BDB885E-814A-4CA8-A81C-1DB35989089B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update6:*:*:*:*:*:*",
              "matchCriteriaId": "653A0452-070F-4312-B94A-F5BCB01B9BDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update60:*:*:*:*:*:*",
              "matchCriteriaId": "B73DA1AE-C62F-4E62-AA98-5697656825F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update61:*:*:*:*:*:*",
              "matchCriteriaId": "D49DEE85-4DDB-4EF4-9F4D-11E7C1364055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update62:*:*:*:*:*:*",
              "matchCriteriaId": "365F28B6-DBF2-45BB-A06D-DD80CFBAD7BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update63:*:*:*:*:*:*",
              "matchCriteriaId": "5FDAD47C-C2DA-4533-AA58-DD6EC09A580A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update64:*:*:*:*:*:*",
              "matchCriteriaId": "5F81F36F-B20F-48B3-A1F2-3D319A34176B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update65:*:*:*:*:*:*",
              "matchCriteriaId": "754329CD-30B7-4410-A371-56A7C261B61B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update66:*:*:*:*:*:*",
              "matchCriteriaId": "C9445405-6B94-4DD1-BA94-B600AA316BB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update67:*:*:*:*:*:*",
              "matchCriteriaId": "960F3F22-9CC8-4655-9B09-777E5A5A1239",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update68:*:*:*:*:*:*",
              "matchCriteriaId": "D2B77C89-7F33-47A0-B6BF-473366033BEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update69:*:*:*:*:*:*",
              "matchCriteriaId": "8183B9D5-1C4D-4D30-BD85-13850FF34CB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update7:*:*:*:*:*:*",
              "matchCriteriaId": "15B67345-D0AF-4BFD-A62D-870F75306A4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update70:*:*:*:*:*:*",
              "matchCriteriaId": "1675366A-2388-4F7E-B423-D39BC7D3D38D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update71:*:*:*:*:*:*",
              "matchCriteriaId": "B93C3CF2-4F45-4F6C-AB6D-F9ABDA7C4DA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update72:*:*:*:*:*:*",
              "matchCriteriaId": "34A6A6A0-9307-4F5D-9605-1F786D1CD62A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update73:*:*:*:*:*:*",
              "matchCriteriaId": "6B994132-7103-4132-9D90-11CA264FEDE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update74:*:*:*:*:*:*",
              "matchCriteriaId": "A1958E04-AB8A-4B0E-AB45-B810CAED2EEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update75:*:*:*:*:*:*",
              "matchCriteriaId": "BB5558B0-6714-4B3A-B287-1943517A975A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update76:*:*:*:*:*:*",
              "matchCriteriaId": "7E325115-EEBC-41F4-8606-45270DA40B98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update77:*:*:*:*:*:*",
              "matchCriteriaId": "848B2C72-447D-46E2-A5A7-43CF3764E578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update78:*:*:*:*:*:*",
              "matchCriteriaId": "26A0AF15-52A9-46FD-8157-359141332EAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update79:*:*:*:*:*:*",
              "matchCriteriaId": "63D63872-C1D0-444F-BCC7-A514F323C256",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update8:*:*:*:*:*:*",
              "matchCriteriaId": "DE1F4262-A054-48CC-BF1D-AA77A94FFFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update80:*:*:*:*:*:*",
              "matchCriteriaId": "9D9FA9AD-39D3-412A-B794-E1B29EEEEC4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*",
              "matchCriteriaId": "294D8A56-A797-433C-A06E-106B2179151A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*",
              "matchCriteriaId": "824D88D9-4645-4CAD-8CAB-30F27DD388C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*",
              "matchCriteriaId": "F6E8C952-B455-46E4-AC3D-D38CAF189F60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*",
              "matchCriteriaId": "CD77C0EE-AC79-4443-A502-C1E02F806911",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*",
              "matchCriteriaId": "648EB53C-7A90-4DA6-BF1C-B5336CDE30C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update86:*:*:*:*:*:*",
              "matchCriteriaId": "39835EF7-8E93-4695-973D-6E9B76C67372",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update87:*:*:*:*:*:*",
              "matchCriteriaId": "2A05FB86-332B-44E3-93CB-82465A38976E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update88:*:*:*:*:*:*",
              "matchCriteriaId": "7C754823-899C-4EEF-ACB7-E1551FA88B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update89:*:*:*:*:*:*",
              "matchCriteriaId": "493D4C18-DEE2-4040-9C13-3A9AB2CE47BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update9:*:*:*:*:*:*",
              "matchCriteriaId": "D176CECA-2821-49EA-86EC-1184C133C0A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update90:*:*:*:*:*:*",
              "matchCriteriaId": "8F17DD75-E63B-4E4C-B136-D43F17B389EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update91:*:*:*:*:*:*",
              "matchCriteriaId": "62EE759A-78AD-40D6-8C5B-10403A8A4A89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update92:*:*:*:*:*:*",
              "matchCriteriaId": "865ABA1F-CA99-4602-B325-F81C9778855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7B3A5E2-23CE-45A8-BD01-77024EB9F9A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF6451A-2A5D-4222-A1C6-113AA4B8D4E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D6CE430-3C95-4855-BA44-E2E136D1FEB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "44FEB149-C792-493D-B055-568FFC96298A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B050DD73-71B6-46CD-A35B-7ACB53BE6C6A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Reflected cross-site scripting (XSS) vulnerability in the Language Override edit screen in Liferay Portal 7.4.3.8 through 7.4.3.97, and Liferay DXP 2023.Q3 before patch 5, and 7.4 update 4 through 92 allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_portal_language_override_web_internal_portlet_PLOPortlet_key parameter."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de cross-site scripting (XSS) reflejado en la pantalla de edici\u00f3n de Language Override en Liferay Portal 7.4.3.8 a 7.4.3.97, y Liferay DXP 2023.Q3 antes del parche 5, y 7.4 actualizaci\u00f3n 4 a 92 permite a atacantes remotos inyectar scripts web arbitrarios o HTML a trav\u00e9s del par\u00e1metro _com_liferay_portal_language_override_web_internal_portlet_PLOPortlet_key."
    }
  ],
  "id": "CVE-2023-42498",
  "lastModified": "2025-01-28T02:47:39.277",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.6,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 6.0,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-21T03:15:08.240",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-42498"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-42498"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-05-24 16:15
Modified
2024-11-21 08:06
Summary
Cross-site scripting (XSS) vulnerability in Layout module in Liferay Portal 7.3.4 through 7.4.3.68, and Liferay DXP 7.3 before update 24, and 7.4 before update 69 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a container type layout fragment's `URL` text field.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
              "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update21:*:*:*:*:*:*",
              "matchCriteriaId": "22B6B8C1-1FF3-41BC-9576-16193AE20CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update34:*:*:*:*:*:*",
              "matchCriteriaId": "9D07DB20-9DCF-4C05-99D2-F6B37A082C14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update36:*:*:*:*:*:*",
              "matchCriteriaId": "1AB71307-7EAA-436A-9CBC-5A94F034FB48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update41:*:*:*:*:*:*",
              "matchCriteriaId": "2B256485-E289-4092-B45B-835DE12625B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*",
              "matchCriteriaId": "CCD1DEA0-8823-4780-B5EE-C1A2BB3C6B4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:*",
              "matchCriteriaId": "DC6FF5AB-B6E4-45D9-854B-29DEC200DA4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update62:*:*:*:*:*:*",
              "matchCriteriaId": "365F28B6-DBF2-45BB-A06D-DD80CFBAD7BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3876F538-0E3F-4375-A52B-191D72FABCF2",
              "versionEndIncluding": "7.4.3.68",
              "versionStartIncluding": "7.3.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in Layout module in Liferay Portal 7.3.4 through 7.4.3.68, and Liferay DXP 7.3 before update 24, and 7.4 before update 69 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a container type layout fragment\u0027s `URL` text field."
    }
  ],
  "id": "CVE-2023-33944",
  "lastModified": "2024-11-21T08:06:15.713",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.7,
        "impactScore": 2.7,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-05-24T16:15:09.693",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33944"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33944"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-03-02 23:15
Modified
2024-11-21 06:16
Summary
The Portal Security module in Liferay Portal 7.2.1 and earlier, and Liferay DXP 7.0 before fix pack 90, 7.1 before fix pack 17 and 7.2 before fix pack 5 does not correctly import users from LDAP, which allows remote attackers to prevent a legitimate user from authenticating by attempting to sign in as a user that exist in LDAP.
Impacted products
Vendor Product Version
liferay liferay_portal *
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:community:*:*:*",
              "matchCriteriaId": "54016156-94AF-4EE7-9165-D7C4705A2BF2",
              "versionEndIncluding": "7.2.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4614C87F-F39C-4ADD-A7A2-4A498612AD38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "6F20D93D-7FB2-4D5F-9249-4DECDE473C42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "CF0821E5-B6E5-44E6-9CF7-77EAE982F677",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "1B24B6A1-8439-49D6-8E78-193144F3DCC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "7E82A6CC-891C-4619-84EA-0DA96E4043C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "70E12054-0DEE-4B92-B8F6-7DC4B2461113",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "3B566A51-3EFC-4A08-8A4F-A9AA43FBE481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "FE1A8781-6B16-4D37-B556-36B99CBCA9F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "3EE11B43-1629-4A22-BE88-0AFB2DFC528C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_17:*:*:*:*:*:*",
              "matchCriteriaId": "10FC6F33-C031-40A4-AFAF-B5CF30F79E52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_18:*:*:*:*:*:*",
              "matchCriteriaId": "99B99578-CACE-47D2-9C1E-A7BBD2B6F6EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_19:*:*:*:*:*:*",
              "matchCriteriaId": "950D98A8-88EE-4C99-817B-C418071B2819",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "F86FF50F-B21A-4B6E-88B8-90D0C042E942",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_20:*:*:*:*:*:*",
              "matchCriteriaId": "CE0E1891-6E76-4069-B412-43B5E5379E0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_21:*:*:*:*:*:*",
              "matchCriteriaId": "404F5FFE-2758-452F-9297-40E0533C6FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_22:*:*:*:*:*:*",
              "matchCriteriaId": "3F5B7E72-8D62-464A-AA82-CBE2625C7687",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_23:*:*:*:*:*:*",
              "matchCriteriaId": "4FA67C68-3E8E-4383-967F-A1FA55AE4897",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_24:*:*:*:*:*:*",
              "matchCriteriaId": "F220793A-FDAC-48C6-B299-39EB3BC077A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_25:*:*:*:*:*:*",
              "matchCriteriaId": "F095A9E1-5FE1-46C4-B0E1-97F8767439D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_26:*:*:*:*:*:*",
              "matchCriteriaId": "DFD748DD-6FDB-44CD-96BF-026D18CE4207",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_27:*:*:*:*:*:*",
              "matchCriteriaId": "0A34F2EA-D0F7-4C9B-BFE6-DA334DFD0EDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_28:*:*:*:*:*:*",
              "matchCriteriaId": "4B3C2426-7617-4535-B86A-7F9BA45DFD0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_29:*:*:*:*:*:*",
              "matchCriteriaId": "88A5CBCE-2BAE-44C7-A7BF-BC30C89839BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "CA6B2500-42E4-4F87-8B93-2F7399B4F611",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_30:*:*:*:*:*:*",
              "matchCriteriaId": "28955834-8E02-4558-ABD3-4958DBB41423",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_31:*:*:*:*:*:*",
              "matchCriteriaId": "89B4F926-5018-4C50-9569-A92BEA6364A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_32:*:*:*:*:*:*",
              "matchCriteriaId": "863C4DBB-9BA2-4A13-8394-08AC500D552A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_33:*:*:*:*:*:*",
              "matchCriteriaId": "C4206C84-C4BD-4363-A4CA-EE229CE06319",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_34:*:*:*:*:*:*",
              "matchCriteriaId": "54CA9915-54C2-4E7F-85AF-781CA0A63A9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_35:*:*:*:*:*:*",
              "matchCriteriaId": "4F644864-1056-4A0C-ADD7-A1992A0AC07D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_36:*:*:*:*:*:*",
              "matchCriteriaId": "91E9BAE9-CD40-4353-95DB-7D9ADC338F95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_37:*:*:*:*:*:*",
              "matchCriteriaId": "C2A29CA0-66CB-4ED9-87B3-57A1C04F59F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_38:*:*:*:*:*:*",
              "matchCriteriaId": "2BFC882E-25C2-46A3-A0DA-A779399A3A30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_39:*:*:*:*:*:*",
              "matchCriteriaId": "661E68A2-B365-4962-87CF-CE17A500889F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "D4094372-E950-4DE0-86D2-CE7F214FD3A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_40:*:*:*:*:*:*",
              "matchCriteriaId": "A5D28279-002A-4BC7-9396-E47FC842D7AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_41:*:*:*:*:*:*",
              "matchCriteriaId": "C700ED72-4626-48A0-B1BB-E0A7C12D454F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_42:*:*:*:*:*:*",
              "matchCriteriaId": "8F473DF1-F70D-4EDB-A011-C8D1C6A21659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_43:*:*:*:*:*:*",
              "matchCriteriaId": "C2351EAC-F6AD-4611-B9BD-39C4DFE85B5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_44:*:*:*:*:*:*",
              "matchCriteriaId": "357845C1-3834-465A-B9CA-F9C604AA8242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_45:*:*:*:*:*:*",
              "matchCriteriaId": "DD35964D-4156-45B8-A0AB-282DA9F4FA47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_46:*:*:*:*:*:*",
              "matchCriteriaId": "35656567-EF24-4948-A72A-C754D6E419B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_47:*:*:*:*:*:*",
              "matchCriteriaId": "E9A3D95D-4539-432D-B241-376F312534AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_48:*:*:*:*:*:*",
              "matchCriteriaId": "81F329F1-5BB1-42A7-98CE-B0EB5819D60A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_49:*:*:*:*:*:*",
              "matchCriteriaId": "5B7111FA-9FD7-4952-AFE1-07D3E14854F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "D35916F1-24AA-4BF3-8B1F-2361C5B815D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_50:*:*:*:*:*:*",
              "matchCriteriaId": "2C7A080F-9C99-41A0-BC63-EBDDC0DF7B8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_51:*:*:*:*:*:*",
              "matchCriteriaId": "0383C4C4-A7BB-418D-9A98-AC4233722961",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_52:*:*:*:*:*:*",
              "matchCriteriaId": "AA281A20-7599-446B-9587-118E920403D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_53:*:*:*:*:*:*",
              "matchCriteriaId": "9514E8F5-1D0B-4CDF-BD03-087326F6C252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_54:*:*:*:*:*:*",
              "matchCriteriaId": "78BC7D6C-2A10-4F78-9C41-EA97665C246E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_55:*:*:*:*:*:*",
              "matchCriteriaId": "B2C29B11-D87B-4D78-9D42-AD528C811080",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_56:*:*:*:*:*:*",
              "matchCriteriaId": "CA9BE427-78D7-4DEE-A174-F3E3675B44A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_57:*:*:*:*:*:*",
              "matchCriteriaId": "6C10325C-8670-499B-B003-7D8634539C5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_58:*:*:*:*:*:*",
              "matchCriteriaId": "5F692BEB-5CB1-41EA-B715-64AB0036F6CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_59:*:*:*:*:*:*",
              "matchCriteriaId": "427C4DF5-9039-4CB5-B600-5F965E20D945",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "EDEE4B40-889C-472E-AA91-7E1B4314EE64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_60:*:*:*:*:*:*",
              "matchCriteriaId": "44B7A2A2-5764-4EDB-AA44-25F8508CF128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_61:*:*:*:*:*:*",
              "matchCriteriaId": "55D94917-5360-4179-A017-1287C63A6E6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_62:*:*:*:*:*:*",
              "matchCriteriaId": "52C5C76D-2572-4ADF-B7E4-7B3444935658",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_63:*:*:*:*:*:*",
              "matchCriteriaId": "9ABFC91A-7A8D-4A08-9464-F534BAA69B4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_64:*:*:*:*:*:*",
              "matchCriteriaId": "1D378A23-113D-47AC-9CB5-2658C357FFB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_65:*:*:*:*:*:*",
              "matchCriteriaId": "58FB119E-508C-45F7-8AD8-B67AAAEA53D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_66:*:*:*:*:*:*",
              "matchCriteriaId": "8B3359A5-D39B-4322-8963-B138D791D232",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_67:*:*:*:*:*:*",
              "matchCriteriaId": "E11E2FBD-7541-4CE3-8A78-52FB82571547",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_68:*:*:*:*:*:*",
              "matchCriteriaId": "3883F470-8D8D-4CB3-BF4A-0C401BDABC83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_69:*:*:*:*:*:*",
              "matchCriteriaId": "1BDCF010-04BF-4FA5-9E14-F6461FED3FFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "3867FDAA-354E-4D2F-A260-27F31CA44C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_70:*:*:*:*:*:*",
              "matchCriteriaId": "7E8CEA39-4A7F-4827-91FA-31119201D174",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_71:*:*:*:*:*:*",
              "matchCriteriaId": "D3768AC9-A245-4B81-8D1D-9D9C5354245C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_72:*:*:*:*:*:*",
              "matchCriteriaId": "71CA65C9-C0FC-4CBD-A8B0-DD72604A46F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_73:*:*:*:*:*:*",
              "matchCriteriaId": "9F06DECA-F45D-49DA-BB24-AA1F0306B0B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_74:*:*:*:*:*:*",
              "matchCriteriaId": "3BA69ED9-28FA-40B5-84F9-0FFE40DFC675",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_75:*:*:*:*:*:*",
              "matchCriteriaId": "6FF2D31F-8719-41A6-ADD5-15BE9409428E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_76:*:*:*:*:*:*",
              "matchCriteriaId": "DE56F5E5-73CF-4636-9F98-86BDDA3F6A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_77:*:*:*:*:*:*",
              "matchCriteriaId": "CE4885B1-F912-4D06-8179-830FC011F3F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_78:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0EFCE-4B74-4B4D-AB6E-5730F26B38FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_79:*:*:*:*:*:*",
              "matchCriteriaId": "F02DCC86-C3F7-482C-9BFB-B7971FB10AEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "A89B7EE4-57FD-4B09-841A-ABC9990FF88F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_80:*:*:*:*:*:*",
              "matchCriteriaId": "06835B0A-A2DF-44D3-A38F-59E5D5523FFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_81:*:*:*:*:*:*",
              "matchCriteriaId": "B746D0CF-76F6-42A1-9056-CA9622DCD806",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_82:*:*:*:*:*:*",
              "matchCriteriaId": "FFC33A7E-B1CB-4E83-B75C-71F5E7E5E406",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_83:*:*:*:*:*:*",
              "matchCriteriaId": "325CFFCF-1609-4D89-B6A8-1C6ACBFDD35B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_84:*:*:*:*:*:*",
              "matchCriteriaId": "BD019A57-FC7A-4B1F-9946-FA15C90FC985",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_85:*:*:*:*:*:*",
              "matchCriteriaId": "A6B2CD3A-C39C-4F9A-8602-3EC75472181D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_86:*:*:*:*:*:*",
              "matchCriteriaId": "1B8DCD85-0E47-44C1-B7DD-E1B4756CEC17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_87:*:*:*:*:*:*",
              "matchCriteriaId": "1790D974-2EE0-4405-8F26-BB6DB3BDA23B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_88:*:*:*:*:*:*",
              "matchCriteriaId": "416B3F04-AD86-4F91-890E-56BA539AAB06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_89:*:*:*:*:*:*",
              "matchCriteriaId": "C12C0E4D-4E9A-4BD7-926E-74BCD42595B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "655A3A6A-A3EB-4864-B64D-2319E5CF7DA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "27DF695E-B890-42C2-8941-5BB53154755F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "072F6C59-3D86-48D1-A14E-477FFFA3B1D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "FE68B4A2-3459-4DBA-8BAC-E9AA9FA25264",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "680D7963-1393-4E86-A65F-D4463D532120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "D81E73DD-FD21-4082-A883-34422AE6C024",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "E6DD0451-98EA-4140-8294-77A14F063E2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "CE94E76B-8CC2-4E91-B7A3-EEBCC1358FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "408BD438-E15C-422F-9612-C62A7387FC63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "A78C8B1C-39CB-4C27-B57C-0AF5E7EB50D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "386F0E26-78DC-4D59-A20F-B41D0E59561B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "54576481-2AE9-4133-9EFA-B7FBDCA4427D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "E29CE810-76D5-4283-B102-70344B6C9506",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "DA869467-C560-4130-A180-86819F6A8673",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "CC0C94B7-31FB-4115-8EDE-62CC459B6663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "07DEAA71-53DA-4508-B7E6-924ABED49E66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "467323F6-5CA7-42A0-9810-C6FA694CEC93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "32EFFD8A-1C0D-446B-AAD7-5D23D483D3D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Portal Security module in Liferay Portal 7.2.1 and earlier, and Liferay DXP 7.0 before fix pack 90, 7.1 before fix pack 17 and 7.2 before fix pack 5 does not correctly import users from LDAP, which allows remote attackers to prevent a legitimate user from authenticating by attempting to sign in as a user that exist in LDAP."
    },
    {
      "lang": "es",
      "value": "El m\u00f3dulo Portal Security en Liferay Portal 7.2.1 y anteriores, y Liferay DXP 7.0 antes del fix pack 90, 7.1 antes del fix pack 17 y 7.2 antes del fix pack 5 no importa correctamente los usuarios de LDAP, lo que permite a los atacantes remotos impedir que un usuario leg\u00edtimo se autentique al intentar iniciar sesi\u00f3n como un usuario que existe en LDAP"
    }
  ],
  "id": "CVE-2021-38266",
  "lastModified": "2024-11-21T06:16:42.417",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-03-02T23:15:08.577",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://issues.liferay.com/browse/LPE-17191"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38266"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://issues.liferay.com/browse/LPE-17191"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38266"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-10-22 15:15
Modified
2024-12-10 21:07
Summary
The Script Console in Liferay Portal 7.0.0 through 7.4.3.101, and Liferay DXP 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 GA through update 35, 7.2 GA through fix pack 20, 7.1 GA through fix pack 28, 7.0 GA through fix pack 102 and 6.2 GA through fix pack 173 does not sufficiently protect against Cross-Site Request Forgery (CSRF) attacks, which allows remote attackers to execute arbitrary Groovy script via a crafted URL or a XSS vulnerability.
Impacted products
Vendor Product Version
liferay digital_experience_platform *
liferay digital_experience_platform *
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay liferay_portal *
liferay liferay_portal *
liferay liferay_portal *
liferay liferay_portal *
liferay liferay_portal *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C6F1E5B-1C88-49AD-8B34-6190F1C6684C",
              "versionEndIncluding": "7.2",
              "versionStartIncluding": "6.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01AC8CB4-9E89-40E6-B4F6-6F1BB36C855D",
              "versionEndExcluding": "2023.q3.5",
              "versionStartIncluding": "2023.q3.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "728DF154-F19F-454C-87CA-1E755107F2A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update10:*:*:*:*:*:*",
              "matchCriteriaId": "AA984F92-4C6C-4049-A731-96F587B51E75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update11:*:*:*:*:*:*",
              "matchCriteriaId": "CADDF499-DDC4-4CEE-B512-404EA2024FCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update12:*:*:*:*:*:*",
              "matchCriteriaId": "9EC64246-1039-4009-B9BD-7828FA0FA1C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update13:*:*:*:*:*:*",
              "matchCriteriaId": "D9F352AE-AE22-4A84-94B6-6621D7E0BC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update14:*:*:*:*:*:*",
              "matchCriteriaId": "3E84D881-6D47-48FD-B743-9D531F5F7D5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update15:*:*:*:*:*:*",
              "matchCriteriaId": "1F8A9DEC-2C27-4EBB-B684-8EBDB374CFCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update16:*:*:*:*:*:*",
              "matchCriteriaId": "C3E7B777-8026-4C8F-9353-B5504873E0F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update17:*:*:*:*:*:*",
              "matchCriteriaId": "2207FEE5-2537-4C6E-AC9C-EC53DBF3C57E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update18:*:*:*:*:*:*",
              "matchCriteriaId": "087A2B43-07CE-4B3D-B879-449631DDA8D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update19:*:*:*:*:*:*",
              "matchCriteriaId": "019CED83-6277-434C-839C-6C4E0C45FB1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update20:*:*:*:*:*:*",
              "matchCriteriaId": "6C533124-74E6-4312-9AF7-6496DE2A5152",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update21:*:*:*:*:*:*",
              "matchCriteriaId": "8DDA248D-5F00-4FC1-B857-A7942BAA1F3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update22:*:*:*:*:*:*",
              "matchCriteriaId": "6C6BA174-69D4-43FC-9395-1B6306A44CDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update23:*:*:*:*:*:*",
              "matchCriteriaId": "A465C229-D3FB-43E9-87BE-119BEE9110F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update24:*:*:*:*:*:*",
              "matchCriteriaId": "32E98546-CE96-4BB8-A11C-F7E850C155F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update25:*:*:*:*:*:*",
              "matchCriteriaId": "DD43C626-F2F2-43BA-85AA-6ADAE8A6D11F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update26:*:*:*:*:*:*",
              "matchCriteriaId": "5C72C0E0-7D0B-4E8F-A109-7BB5DCA1C8D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update27:*:*:*:*:*:*",
              "matchCriteriaId": "7E796B04-FF54-4C02-979C-87E137A76F63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update28:*:*:*:*:*:*",
              "matchCriteriaId": "07C3D771-5E1B-46C4-AAF8-F425377582D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update29:*:*:*:*:*:*",
              "matchCriteriaId": "B08F95DC-BE49-4717-B959-2BE8BD131953",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update30:*:*:*:*:*:*",
              "matchCriteriaId": "E915FBC2-9BF7-4A99-B201-1F176D743494",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update31:*:*:*:*:*:*",
              "matchCriteriaId": "E44E02C2-6F83-4525-BF9D-E82CE9A9880E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update32:*:*:*:*:*:*",
              "matchCriteriaId": "660F37C6-61E6-4C34-8A7E-99C7DBEB8319",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update33:*:*:*:*:*:*",
              "matchCriteriaId": "5AD8D0D3-31AC-41E5-A780-5D5B18BF6991",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update34:*:*:*:*:*:*",
              "matchCriteriaId": "02D4C998-77F5-4428-A7B9-F7D909E23E92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update35:*:*:*:*:*:*",
              "matchCriteriaId": "C6984AC8-461D-488F-A911-7BF1D12B44A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update4:*:*:*:*:*:*",
              "matchCriteriaId": "AD408C73-7D78-4EB1-AA2C-F4A6D4DC980B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update5:*:*:*:*:*:*",
              "matchCriteriaId": "513F3229-7C31-44EB-88F6-E564BE725853",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update6:*:*:*:*:*:*",
              "matchCriteriaId": "76B9CD05-A10E-439C-9FDE-EA88EC3AF2C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update7:*:*:*:*:*:*",
              "matchCriteriaId": "A7D2D415-36AA-41B2-8FD9-21A98CDFE1EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update8:*:*:*:*:*:*",
              "matchCriteriaId": "124F2D2E-F8E7-4EDE-A98B-DD72FB43DF20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update9:*:*:*:*:*:*",
              "matchCriteriaId": "0DEE5985-289E-4138-B7C0-1E471BA7A1FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
              "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update10:*:*:*:*:*:*",
              "matchCriteriaId": "C7B02106-D5EA-4A59-A959-CCE2AC8F55BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update11:*:*:*:*:*:*",
              "matchCriteriaId": "80204464-5DC5-4A52-B844-C833A96E6BD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update12:*:*:*:*:*:*",
              "matchCriteriaId": "6F8A5D02-0B45-4DA9-ACD8-42C1BFF62827",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update13:*:*:*:*:*:*",
              "matchCriteriaId": "38DA7C99-AC2C-4B9A-B611-4697159E1D79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update14:*:*:*:*:*:*",
              "matchCriteriaId": "F264AD07-D105-4F00-8920-6D8146E4FA63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update15:*:*:*:*:*:*",
              "matchCriteriaId": "C929CF16-4725-492A-872B-0928FE388FC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update16:*:*:*:*:*:*",
              "matchCriteriaId": "1B8750A1-E481-48D4-84F4-97D1ABE15B46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update17:*:*:*:*:*:*",
              "matchCriteriaId": "454F8410-D9AC-481E-841C-60F0DF2CC25E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update18:*:*:*:*:*:*",
              "matchCriteriaId": "D1A442EE-460F-4823-B9EF-4421050F0847",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update19:*:*:*:*:*:*",
              "matchCriteriaId": "608B205D-0B79-4D1C-B2C1-64C31DB1896E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update2:*:*:*:*:*:*",
              "matchCriteriaId": "10B863B8-201D-494C-8175-168820996174",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update20:*:*:*:*:*:*",
              "matchCriteriaId": "4427DC78-E80C-4057-A295-B0731437A99E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update21:*:*:*:*:*:*",
              "matchCriteriaId": "22B6B8C1-1FF3-41BC-9576-16193AE20CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update22:*:*:*:*:*:*",
              "matchCriteriaId": "DDA17F24-1A7E-4BEB-9C98-41761A2A36A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update23:*:*:*:*:*:*",
              "matchCriteriaId": "3B062851-CE6B-44F4-8222-422EC9872EC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update24:*:*:*:*:*:*",
              "matchCriteriaId": "D4687FDA-0078-4E89-ADD8-7EDDA68261A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update25:*:*:*:*:*:*",
              "matchCriteriaId": "7EA29B09-CC24-4063-96A5-96AA08C0886D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update26:*:*:*:*:*:*",
              "matchCriteriaId": "331FC246-D3E9-4711-B305-BE51BF743CF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update27:*:*:*:*:*:*",
              "matchCriteriaId": "A5823BC0-8C11-4C31-9E99-3C9D82918E2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update28:*:*:*:*:*:*",
              "matchCriteriaId": "E2E6CB66-1AE1-4626-8070-64C250ED8363",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update29:*:*:*:*:*:*",
              "matchCriteriaId": "B63449AA-6831-4290-B1FA-0BB806820402",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update3:*:*:*:*:*:*",
              "matchCriteriaId": "CBF766CE-CBB8-472A-BAF0-BD39A7BCB4DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update30:*:*:*:*:*:*",
              "matchCriteriaId": "B3B169F6-B8B8-4612-AD7D-F75CC6A9297B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update31:*:*:*:*:*:*",
              "matchCriteriaId": "12D46756-D26D-4877-ACE8-1C2721908428",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update32:*:*:*:*:*:*",
              "matchCriteriaId": "5403DCEF-20C2-4568-8DF1-30804F522915",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update33:*:*:*:*:*:*",
              "matchCriteriaId": "90E39742-90BE-4DEB-AB78-F9B8F7333F9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update34:*:*:*:*:*:*",
              "matchCriteriaId": "9D07DB20-9DCF-4C05-99D2-F6B37A082C14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update35:*:*:*:*:*:*",
              "matchCriteriaId": "341D1157-8118-4BD3-A902-36E90E066706",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update36:*:*:*:*:*:*",
              "matchCriteriaId": "1AB71307-7EAA-436A-9CBC-5A94F034FB48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update37:*:*:*:*:*:*",
              "matchCriteriaId": "9446B3A5-6647-416C-92AF-7B6E0E929765",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update38:*:*:*:*:*:*",
              "matchCriteriaId": "06386C7A-CAA1-4FC4-9182-5A66342FB903",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update39:*:*:*:*:*:*",
              "matchCriteriaId": "8C84B701-B9A1-43D0-AF0C-30EDBD24CF90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update4:*:*:*:*:*:*",
              "matchCriteriaId": "182FAA46-D9FB-4170-B305-BAD0DF6E5DE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update40:*:*:*:*:*:*",
              "matchCriteriaId": "BA9AF651-D118-4437-B400-531B26BF6801",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update41:*:*:*:*:*:*",
              "matchCriteriaId": "2B256485-E289-4092-B45B-835DE12625B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update42:*:*:*:*:*:*",
              "matchCriteriaId": "119B54BD-75F4-46A4-A57D-16CFF4E12CEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update43:*:*:*:*:*:*",
              "matchCriteriaId": "A3382E2D-A414-40A1-A330-619859756A36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update44:*:*:*:*:*:*",
              "matchCriteriaId": "2E07B750-55B6-4DB6-B02B-216C2F5505A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update45:*:*:*:*:*:*",
              "matchCriteriaId": "B921E670-480F-4793-A636-3855A1654908",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update46:*:*:*:*:*:*",
              "matchCriteriaId": "62AE52FE-FB7F-4339-BDDE-E5AD235BBC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update47:*:*:*:*:*:*",
              "matchCriteriaId": "C99508DB-19E9-4832-AB38-57C61C7D68BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update48:*:*:*:*:*:*",
              "matchCriteriaId": "67F50AF8-7B0E-4D01-9EB2-C6625E9DACB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update49:*:*:*:*:*:*",
              "matchCriteriaId": "131E4E65-D997-47F1-8CB8-15CE6A60AB1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update5:*:*:*:*:*:*",
              "matchCriteriaId": "DF1BB9E6-D690-4C12-AEF0-4BD712869CBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*",
              "matchCriteriaId": "CCD1DEA0-8823-4780-B5EE-C1A2BB3C6B4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update51:*:*:*:*:*:*",
              "matchCriteriaId": "94AC684E-3C5F-4859-B6EB-42C478F9DD11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:*",
              "matchCriteriaId": "DC6FF5AB-B6E4-45D9-854B-29DEC200DA4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update53:*:*:*:*:*:*",
              "matchCriteriaId": "9855E3CB-925E-4623-A776-59422AB2FC6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update54:*:*:*:*:*:*",
              "matchCriteriaId": "01C3B7BE-1F9B-4EDA-990C-A4022CB85612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update55:*:*:*:*:*:*",
              "matchCriteriaId": "65CF766C-626D-4F8C-BDBF-F0C5404DD545",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update56:*:*:*:*:*:*",
              "matchCriteriaId": "720EF24C-9A36-405B-A380-6114C150B376",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update57:*:*:*:*:*:*",
              "matchCriteriaId": "44479EF5-40BD-43A2-AD0F-CE1660222AB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update58:*:*:*:*:*:*",
              "matchCriteriaId": "B8E0BD92-0F77-481E-8167-F81755E00703",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update59:*:*:*:*:*:*",
              "matchCriteriaId": "2BDB885E-814A-4CA8-A81C-1DB35989089B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update6:*:*:*:*:*:*",
              "matchCriteriaId": "653A0452-070F-4312-B94A-F5BCB01B9BDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update60:*:*:*:*:*:*",
              "matchCriteriaId": "B73DA1AE-C62F-4E62-AA98-5697656825F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update61:*:*:*:*:*:*",
              "matchCriteriaId": "D49DEE85-4DDB-4EF4-9F4D-11E7C1364055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update62:*:*:*:*:*:*",
              "matchCriteriaId": "365F28B6-DBF2-45BB-A06D-DD80CFBAD7BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update63:*:*:*:*:*:*",
              "matchCriteriaId": "5FDAD47C-C2DA-4533-AA58-DD6EC09A580A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update64:*:*:*:*:*:*",
              "matchCriteriaId": "5F81F36F-B20F-48B3-A1F2-3D319A34176B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update65:*:*:*:*:*:*",
              "matchCriteriaId": "754329CD-30B7-4410-A371-56A7C261B61B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update66:*:*:*:*:*:*",
              "matchCriteriaId": "C9445405-6B94-4DD1-BA94-B600AA316BB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update67:*:*:*:*:*:*",
              "matchCriteriaId": "960F3F22-9CC8-4655-9B09-777E5A5A1239",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update68:*:*:*:*:*:*",
              "matchCriteriaId": "D2B77C89-7F33-47A0-B6BF-473366033BEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update69:*:*:*:*:*:*",
              "matchCriteriaId": "8183B9D5-1C4D-4D30-BD85-13850FF34CB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update7:*:*:*:*:*:*",
              "matchCriteriaId": "15B67345-D0AF-4BFD-A62D-870F75306A4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update70:*:*:*:*:*:*",
              "matchCriteriaId": "1675366A-2388-4F7E-B423-D39BC7D3D38D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update71:*:*:*:*:*:*",
              "matchCriteriaId": "B93C3CF2-4F45-4F6C-AB6D-F9ABDA7C4DA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update72:*:*:*:*:*:*",
              "matchCriteriaId": "34A6A6A0-9307-4F5D-9605-1F786D1CD62A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update73:*:*:*:*:*:*",
              "matchCriteriaId": "6B994132-7103-4132-9D90-11CA264FEDE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update74:*:*:*:*:*:*",
              "matchCriteriaId": "A1958E04-AB8A-4B0E-AB45-B810CAED2EEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update75:*:*:*:*:*:*",
              "matchCriteriaId": "BB5558B0-6714-4B3A-B287-1943517A975A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update76:*:*:*:*:*:*",
              "matchCriteriaId": "7E325115-EEBC-41F4-8606-45270DA40B98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update77:*:*:*:*:*:*",
              "matchCriteriaId": "848B2C72-447D-46E2-A5A7-43CF3764E578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update78:*:*:*:*:*:*",
              "matchCriteriaId": "26A0AF15-52A9-46FD-8157-359141332EAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update79:*:*:*:*:*:*",
              "matchCriteriaId": "63D63872-C1D0-444F-BCC7-A514F323C256",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update8:*:*:*:*:*:*",
              "matchCriteriaId": "DE1F4262-A054-48CC-BF1D-AA77A94FFFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update80:*:*:*:*:*:*",
              "matchCriteriaId": "9D9FA9AD-39D3-412A-B794-E1B29EEEEC4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*",
              "matchCriteriaId": "294D8A56-A797-433C-A06E-106B2179151A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*",
              "matchCriteriaId": "824D88D9-4645-4CAD-8CAB-30F27DD388C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*",
              "matchCriteriaId": "F6E8C952-B455-46E4-AC3D-D38CAF189F60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*",
              "matchCriteriaId": "CD77C0EE-AC79-4443-A502-C1E02F806911",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*",
              "matchCriteriaId": "648EB53C-7A90-4DA6-BF1C-B5336CDE30C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update86:*:*:*:*:*:*",
              "matchCriteriaId": "39835EF7-8E93-4695-973D-6E9B76C67372",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update87:*:*:*:*:*:*",
              "matchCriteriaId": "2A05FB86-332B-44E3-93CB-82465A38976E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update88:*:*:*:*:*:*",
              "matchCriteriaId": "7C754823-899C-4EEF-ACB7-E1551FA88B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update89:*:*:*:*:*:*",
              "matchCriteriaId": "493D4C18-DEE2-4040-9C13-3A9AB2CE47BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update9:*:*:*:*:*:*",
              "matchCriteriaId": "D176CECA-2821-49EA-86EC-1184C133C0A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update90:*:*:*:*:*:*",
              "matchCriteriaId": "8F17DD75-E63B-4E4C-B136-D43F17B389EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update91:*:*:*:*:*:*",
              "matchCriteriaId": "62EE759A-78AD-40D6-8C5B-10403A8A4A89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update92:*:*:*:*:*:*",
              "matchCriteriaId": "865ABA1F-CA99-4602-B325-F81C9778855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7471D27F-6FDF-4214-9DAF-CC68CE6DB80D",
              "versionEndExcluding": "7.0.6",
              "versionStartIncluding": "7.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "74992E49-BDF7-4AE0-A1F1-A2DD59ED6F2D",
              "versionEndExcluding": "7.1.3",
              "versionStartIncluding": "7.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7CAF8FC-6334-48FD-A3E0-83EE307A5210",
              "versionEndIncluding": "7.2.1",
              "versionStartIncluding": "7.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13F59EAA-9EC8-44CC-8F56-BC26981F584F",
              "versionEndIncluding": "7.3.7",
              "versionStartIncluding": "7.3.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "79CB407F-11CB-45E9-AE4D-5926AE59EA0F",
              "versionEndExcluding": "7.4.3.102",
              "versionStartIncluding": "7.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Script Console in Liferay Portal 7.0.0 through 7.4.3.101, and Liferay DXP 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 GA through update 35, 7.2 GA through fix pack 20, 7.1 GA through fix pack 28, 7.0 GA through fix pack 102 and 6.2 GA through fix pack 173\n does not sufficiently protect against Cross-Site Request Forgery (CSRF) attacks, which allows remote attackers to execute arbitrary Groovy script via a crafted URL or a XSS vulnerability."
    },
    {
      "lang": "es",
      "value": "La consola de scripts en Liferay Portal 7.0.0 a 7.4.3.101, y Liferay DXP 2023.Q3.1 a 2023.Q3.4, 7.4 GA a la actualizaci\u00f3n 92, 7.3 GA a la actualizaci\u00f3n 35, 7.2 GA a trav\u00e9s del fixpack 20, 7.1 GA a trav\u00e9s del fixpack 28, 7.0 GA a trav\u00e9s del fixpack 102 y 6.2 GA a trav\u00e9s del fixpack 173 no protege lo suficiente contra ataques de Cross-Site Request Forgery (CSRF), que permiten a atacantes remotos ejecutar scripts de Groovy arbitrarios a trav\u00e9s de una URL manipulada o una vulnerabilidad XSS."
    }
  ],
  "id": "CVE-2024-8980",
  "lastModified": "2024-12-10T21:07:09.857",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.6,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 6.0,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-10-22T15:15:07.337",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2024-8980"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-352"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-352"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-20 08:15
Modified
2024-12-10 23:01
Summary
Information disclosure vulnerability in the Control Panel in Liferay Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before update 4, 7.2 before fix pack 19, and older unsupported versions allows remote authenticated users to obtain a user's full name from the page's title by enumerating user screen names.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459",
              "versionEndExcluding": "7.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "311EE92A-0EEF-4556-A52F-E6C9522FA2DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "49501C9E-D12A-45E0-92F3-8FD5FDC6D3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_17:*:*:*:*:*:*",
              "matchCriteriaId": "F2B55C77-9FAA-4E14-8CEF-9C4CAC804007",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_18:*:*:*:*:*:*",
              "matchCriteriaId": "54E499E6-C747-476B-BFE2-C04D9F8744F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "43F61E2F-4643-4D5D-84DB-7B7B6E93C67B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "8B057D81-7589-4007-9A0D-2D302B82F9CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "6F0F2558-6990-43D7-9FE2-8E99D81B8269",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "11072673-C3AB-42EA-A26F-890DEE903D42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "134560B0-9746-4EC3-8DE3-26E53E2CAC6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "71E41E59-D71F-48F0-812B-39D59F81997B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "728DF154-F19F-454C-87CA-1E755107F2A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "831BFAEF-E7B6-4E84-9142-79B93FBA0E8A",
              "versionEndExcluding": "7.4.3.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Information disclosure vulnerability in the Control Panel in Liferay Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before update 4, 7.2 before fix pack 19, and older unsupported versions allows remote authenticated users to obtain a user\u0027s full name from the page\u0027s title by enumerating user screen names."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en el Panel de control en Liferay Portal 7.2.0 a 7.4.2 y versiones anteriores no compatibles, y Liferay DXP 7.3 anterior a la actualizaci\u00f3n 4, 7.2 anterior al fix pack 19 y las versiones anteriores no compatibles permiten a los usuarios autenticados remotamente obtener el nombre completo de un usuario a partir del t\u00edtulo de la p\u00e1gina enumerando los nombres de pantalla de los usuarios."
    }
  ],
  "id": "CVE-2024-25150",
  "lastModified": "2024-12-10T23:01:58.647",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-20T08:15:07.290",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25150"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25150"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-201"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-04-25 16:16
Modified
2024-11-21 06:54
Summary
Cross-site scripting (XSS) vulnerability in Journal module's web content display configuration page in Liferay Portal 7.1.0 through 7.3.3, and Liferay DXP 7.0 before fix pack 94, 7.1 before fix pack 19, and 7.2 before fix pack 8, allows remote attackers to inject arbitrary web script or HTML via web content template names.
Impacted products
Vendor Product Version
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay liferay_portal *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4614C87F-F39C-4ADD-A7A2-4A498612AD38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "6F20D93D-7FB2-4D5F-9249-4DECDE473C42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "CF0821E5-B6E5-44E6-9CF7-77EAE982F677",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "1B24B6A1-8439-49D6-8E78-193144F3DCC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "7E82A6CC-891C-4619-84EA-0DA96E4043C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "70E12054-0DEE-4B92-B8F6-7DC4B2461113",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "3B566A51-3EFC-4A08-8A4F-A9AA43FBE481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "FE1A8781-6B16-4D37-B556-36B99CBCA9F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "3EE11B43-1629-4A22-BE88-0AFB2DFC528C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_17:*:*:*:*:*:*",
              "matchCriteriaId": "10FC6F33-C031-40A4-AFAF-B5CF30F79E52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_18:*:*:*:*:*:*",
              "matchCriteriaId": "99B99578-CACE-47D2-9C1E-A7BBD2B6F6EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_19:*:*:*:*:*:*",
              "matchCriteriaId": "950D98A8-88EE-4C99-817B-C418071B2819",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "F86FF50F-B21A-4B6E-88B8-90D0C042E942",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_20:*:*:*:*:*:*",
              "matchCriteriaId": "CE0E1891-6E76-4069-B412-43B5E5379E0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_21:*:*:*:*:*:*",
              "matchCriteriaId": "404F5FFE-2758-452F-9297-40E0533C6FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_22:*:*:*:*:*:*",
              "matchCriteriaId": "3F5B7E72-8D62-464A-AA82-CBE2625C7687",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_23:*:*:*:*:*:*",
              "matchCriteriaId": "4FA67C68-3E8E-4383-967F-A1FA55AE4897",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_24:*:*:*:*:*:*",
              "matchCriteriaId": "F220793A-FDAC-48C6-B299-39EB3BC077A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_25:*:*:*:*:*:*",
              "matchCriteriaId": "F095A9E1-5FE1-46C4-B0E1-97F8767439D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_26:*:*:*:*:*:*",
              "matchCriteriaId": "DFD748DD-6FDB-44CD-96BF-026D18CE4207",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_27:*:*:*:*:*:*",
              "matchCriteriaId": "0A34F2EA-D0F7-4C9B-BFE6-DA334DFD0EDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_28:*:*:*:*:*:*",
              "matchCriteriaId": "4B3C2426-7617-4535-B86A-7F9BA45DFD0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_29:*:*:*:*:*:*",
              "matchCriteriaId": "88A5CBCE-2BAE-44C7-A7BF-BC30C89839BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "CA6B2500-42E4-4F87-8B93-2F7399B4F611",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_30:*:*:*:*:*:*",
              "matchCriteriaId": "28955834-8E02-4558-ABD3-4958DBB41423",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_31:*:*:*:*:*:*",
              "matchCriteriaId": "89B4F926-5018-4C50-9569-A92BEA6364A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_32:*:*:*:*:*:*",
              "matchCriteriaId": "863C4DBB-9BA2-4A13-8394-08AC500D552A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_33:*:*:*:*:*:*",
              "matchCriteriaId": "C4206C84-C4BD-4363-A4CA-EE229CE06319",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_34:*:*:*:*:*:*",
              "matchCriteriaId": "54CA9915-54C2-4E7F-85AF-781CA0A63A9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_35:*:*:*:*:*:*",
              "matchCriteriaId": "4F644864-1056-4A0C-ADD7-A1992A0AC07D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_36:*:*:*:*:*:*",
              "matchCriteriaId": "91E9BAE9-CD40-4353-95DB-7D9ADC338F95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_37:*:*:*:*:*:*",
              "matchCriteriaId": "C2A29CA0-66CB-4ED9-87B3-57A1C04F59F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_38:*:*:*:*:*:*",
              "matchCriteriaId": "2BFC882E-25C2-46A3-A0DA-A779399A3A30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_39:*:*:*:*:*:*",
              "matchCriteriaId": "661E68A2-B365-4962-87CF-CE17A500889F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "D4094372-E950-4DE0-86D2-CE7F214FD3A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_40:*:*:*:*:*:*",
              "matchCriteriaId": "A5D28279-002A-4BC7-9396-E47FC842D7AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_41:*:*:*:*:*:*",
              "matchCriteriaId": "C700ED72-4626-48A0-B1BB-E0A7C12D454F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_42:*:*:*:*:*:*",
              "matchCriteriaId": "8F473DF1-F70D-4EDB-A011-C8D1C6A21659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_43:*:*:*:*:*:*",
              "matchCriteriaId": "C2351EAC-F6AD-4611-B9BD-39C4DFE85B5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_44:*:*:*:*:*:*",
              "matchCriteriaId": "357845C1-3834-465A-B9CA-F9C604AA8242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_45:*:*:*:*:*:*",
              "matchCriteriaId": "DD35964D-4156-45B8-A0AB-282DA9F4FA47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_46:*:*:*:*:*:*",
              "matchCriteriaId": "35656567-EF24-4948-A72A-C754D6E419B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_47:*:*:*:*:*:*",
              "matchCriteriaId": "E9A3D95D-4539-432D-B241-376F312534AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_48:*:*:*:*:*:*",
              "matchCriteriaId": "81F329F1-5BB1-42A7-98CE-B0EB5819D60A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_49:*:*:*:*:*:*",
              "matchCriteriaId": "5B7111FA-9FD7-4952-AFE1-07D3E14854F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "D35916F1-24AA-4BF3-8B1F-2361C5B815D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_50:*:*:*:*:*:*",
              "matchCriteriaId": "2C7A080F-9C99-41A0-BC63-EBDDC0DF7B8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_51:*:*:*:*:*:*",
              "matchCriteriaId": "0383C4C4-A7BB-418D-9A98-AC4233722961",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_52:*:*:*:*:*:*",
              "matchCriteriaId": "AA281A20-7599-446B-9587-118E920403D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_53:*:*:*:*:*:*",
              "matchCriteriaId": "9514E8F5-1D0B-4CDF-BD03-087326F6C252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_54:*:*:*:*:*:*",
              "matchCriteriaId": "78BC7D6C-2A10-4F78-9C41-EA97665C246E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_55:*:*:*:*:*:*",
              "matchCriteriaId": "B2C29B11-D87B-4D78-9D42-AD528C811080",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_56:*:*:*:*:*:*",
              "matchCriteriaId": "CA9BE427-78D7-4DEE-A174-F3E3675B44A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_57:*:*:*:*:*:*",
              "matchCriteriaId": "6C10325C-8670-499B-B003-7D8634539C5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_58:*:*:*:*:*:*",
              "matchCriteriaId": "5F692BEB-5CB1-41EA-B715-64AB0036F6CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_59:*:*:*:*:*:*",
              "matchCriteriaId": "427C4DF5-9039-4CB5-B600-5F965E20D945",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "EDEE4B40-889C-472E-AA91-7E1B4314EE64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_60:*:*:*:*:*:*",
              "matchCriteriaId": "44B7A2A2-5764-4EDB-AA44-25F8508CF128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_61:*:*:*:*:*:*",
              "matchCriteriaId": "55D94917-5360-4179-A017-1287C63A6E6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_62:*:*:*:*:*:*",
              "matchCriteriaId": "52C5C76D-2572-4ADF-B7E4-7B3444935658",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_63:*:*:*:*:*:*",
              "matchCriteriaId": "9ABFC91A-7A8D-4A08-9464-F534BAA69B4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_64:*:*:*:*:*:*",
              "matchCriteriaId": "1D378A23-113D-47AC-9CB5-2658C357FFB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_65:*:*:*:*:*:*",
              "matchCriteriaId": "58FB119E-508C-45F7-8AD8-B67AAAEA53D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_66:*:*:*:*:*:*",
              "matchCriteriaId": "8B3359A5-D39B-4322-8963-B138D791D232",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_67:*:*:*:*:*:*",
              "matchCriteriaId": "E11E2FBD-7541-4CE3-8A78-52FB82571547",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_68:*:*:*:*:*:*",
              "matchCriteriaId": "3883F470-8D8D-4CB3-BF4A-0C401BDABC83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_69:*:*:*:*:*:*",
              "matchCriteriaId": "1BDCF010-04BF-4FA5-9E14-F6461FED3FFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "3867FDAA-354E-4D2F-A260-27F31CA44C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_70:*:*:*:*:*:*",
              "matchCriteriaId": "7E8CEA39-4A7F-4827-91FA-31119201D174",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_71:*:*:*:*:*:*",
              "matchCriteriaId": "D3768AC9-A245-4B81-8D1D-9D9C5354245C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_72:*:*:*:*:*:*",
              "matchCriteriaId": "71CA65C9-C0FC-4CBD-A8B0-DD72604A46F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_73:*:*:*:*:*:*",
              "matchCriteriaId": "9F06DECA-F45D-49DA-BB24-AA1F0306B0B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_74:*:*:*:*:*:*",
              "matchCriteriaId": "3BA69ED9-28FA-40B5-84F9-0FFE40DFC675",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_75:*:*:*:*:*:*",
              "matchCriteriaId": "6FF2D31F-8719-41A6-ADD5-15BE9409428E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_76:*:*:*:*:*:*",
              "matchCriteriaId": "DE56F5E5-73CF-4636-9F98-86BDDA3F6A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_77:*:*:*:*:*:*",
              "matchCriteriaId": "CE4885B1-F912-4D06-8179-830FC011F3F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_78:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0EFCE-4B74-4B4D-AB6E-5730F26B38FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_79:*:*:*:*:*:*",
              "matchCriteriaId": "F02DCC86-C3F7-482C-9BFB-B7971FB10AEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "A89B7EE4-57FD-4B09-841A-ABC9990FF88F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_80:*:*:*:*:*:*",
              "matchCriteriaId": "06835B0A-A2DF-44D3-A38F-59E5D5523FFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_81:*:*:*:*:*:*",
              "matchCriteriaId": "B746D0CF-76F6-42A1-9056-CA9622DCD806",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_82:*:*:*:*:*:*",
              "matchCriteriaId": "FFC33A7E-B1CB-4E83-B75C-71F5E7E5E406",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_83:*:*:*:*:*:*",
              "matchCriteriaId": "325CFFCF-1609-4D89-B6A8-1C6ACBFDD35B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_84:*:*:*:*:*:*",
              "matchCriteriaId": "BD019A57-FC7A-4B1F-9946-FA15C90FC985",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_85:*:*:*:*:*:*",
              "matchCriteriaId": "A6B2CD3A-C39C-4F9A-8602-3EC75472181D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_86:*:*:*:*:*:*",
              "matchCriteriaId": "1B8DCD85-0E47-44C1-B7DD-E1B4756CEC17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_87:*:*:*:*:*:*",
              "matchCriteriaId": "1790D974-2EE0-4405-8F26-BB6DB3BDA23B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_88:*:*:*:*:*:*",
              "matchCriteriaId": "416B3F04-AD86-4F91-890E-56BA539AAB06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_89:*:*:*:*:*:*",
              "matchCriteriaId": "C12C0E4D-4E9A-4BD7-926E-74BCD42595B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "655A3A6A-A3EB-4864-B64D-2319E5CF7DA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_90:*:*:*:*:*:*",
              "matchCriteriaId": "9A659FEF-1BC1-45E8-A01E-1F9A8F2AFAAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_91:*:*:*:*:*:*",
              "matchCriteriaId": "3810319D-7DC4-47DD-B568-B0504DBC8209",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_92:*:*:*:*:*:*",
              "matchCriteriaId": "D9BFFFC0-912A-4F95-A08E-1D264135D1E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_93:*:*:*:*:*:*",
              "matchCriteriaId": "9EA924E7-DEF2-45BF-B435-C435AC20AF4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "27DF695E-B890-42C2-8941-5BB53154755F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "072F6C59-3D86-48D1-A14E-477FFFA3B1D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "FE68B4A2-3459-4DBA-8BAC-E9AA9FA25264",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "680D7963-1393-4E86-A65F-D4463D532120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "D81E73DD-FD21-4082-A883-34422AE6C024",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "E6DD0451-98EA-4140-8294-77A14F063E2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "CE94E76B-8CC2-4E91-B7A3-EEBCC1358FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "408BD438-E15C-422F-9612-C62A7387FC63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "A78C8B1C-39CB-4C27-B57C-0AF5E7EB50D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_17:*:*:*:*:*:*",
              "matchCriteriaId": "0AB19E97-BACE-4FCC-A53F-078D61A7A9E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_18:*:*:*:*:*:*",
              "matchCriteriaId": "D18ACD28-9182-435C-A30F-DF3BFE13C39A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6772278-8079-406E-8731-EAAA6183E41C",
              "versionEndIncluding": "7.3.3",
              "versionStartIncluding": "7.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in Journal module\u0027s web content display configuration page in Liferay Portal 7.1.0 through 7.3.3, and Liferay DXP 7.0 before fix pack 94, 7.1 before fix pack 19, and 7.2 before fix pack 8, allows remote attackers to inject arbitrary web script or HTML via web content template names."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de tipo Cross-site scripting (XSS) en la p\u00e1gina de configuraci\u00f3n de visualizaci\u00f3n de contenido web del m\u00f3dulo Journal en Liferay Portal versiones 7.1.0 hasta 7.3.3, y Liferay DXP versiones 7.0 anteriores al paquete de correcciones 94, versiones 7.1 anteriores al paquete de correcciones 19, y versiones 7.2 anteriores al paquete de correcciones 8, permite a atacantes remotos inyectar scripts web o HTML arbitrarios por medio de los nombres de las plantillas de contenido web"
    }
  ],
  "id": "CVE-2022-26596",
  "lastModified": "2024-11-21T06:54:11.227",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-04-25T16:16:09.067",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://liferay.com"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-20 09:15
Modified
2024-12-10 22:59
Summary
Liferay Portal 7.2.0 through 7.4.3.4, and older unsupported versions, and Liferay DXP 7.4.13, 7.3 before service pack 3, 7.2 before fix pack 17, and older unsupported versions does not properly check user permissions, which allows remote authenticated users with the VIEW user permission to edit their own permission via the User and Organizations section of the Control Panel.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459",
              "versionEndExcluding": "7.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "311EE92A-0EEF-4556-A52F-E6C9522FA2DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "49501C9E-D12A-45E0-92F3-8FD5FDC6D3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "43F61E2F-4643-4D5D-84DB-7B7B6E93C67B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "8B057D81-7589-4007-9A0D-2D302B82F9CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "6F0F2558-6990-43D7-9FE2-8E99D81B8269",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "11072673-C3AB-42EA-A26F-890DEE903D42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "134560B0-9746-4EC3-8DE3-26E53E2CAC6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E04E0EDA-8E18-43C3-A0B2-DF45B7CE811D",
              "versionEndExcluding": "7.4.3.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Liferay Portal 7.2.0 through 7.4.3.4, and older unsupported versions, and Liferay DXP 7.4.13, 7.3 before service pack 3, 7.2 before fix pack 17, and older unsupported versions does not properly check user permissions, which allows remote authenticated users with the VIEW user permission to edit their own permission via the User and Organizations section of the Control Panel."
    },
    {
      "lang": "es",
      "value": "Liferay Portal 7.2.0 a 7.4.3.4 y versiones anteriores no compatibles, y Liferay DXP 7.4.13, 7.3 anterior al service pack 3, 7.2 anterior al fix pack 17 y versiones anteriores no compatibles no comprueban correctamente los permisos de usuario, lo que permite a los usuarios autenticados remotamente con el permiso de usuario VER para editar su propio permiso a trav\u00e9s de la secci\u00f3n Usuarios y organizaciones del Panel de control."
    }
  ],
  "id": "CVE-2024-25604",
  "lastModified": "2024-12-10T22:59:32.727",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-20T09:15:09.057",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25604"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25604"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-863"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-863"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-10-17 12:15
Modified
2024-11-21 08:22
Summary
Stored cross-site scripting (XSS) vulnerability in the Wiki widget in Liferay Portal 7.1.0 through 7.4.3.87, and Liferay DXP 7.0 fix pack 83 through 102, 7.1 fix pack 28 and earlier, 7.2 fix pack 20 and earlier, 7.3 update 33 and earlier, and 7.4 before update 88 allows remote attackers to inject arbitrary web script or HTML into a parent wiki page via a crafted payload injected into a wiki page's ‘Content’ text field.
Impacted products
Vendor Product Version
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay liferay_portal *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4614C87F-F39C-4ADD-A7A2-4A498612AD38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "6F20D93D-7FB2-4D5F-9249-4DECDE473C42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "CF0821E5-B6E5-44E6-9CF7-77EAE982F677",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "1B24B6A1-8439-49D6-8E78-193144F3DCC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "7E82A6CC-891C-4619-84EA-0DA96E4043C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "70E12054-0DEE-4B92-B8F6-7DC4B2461113",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "3B566A51-3EFC-4A08-8A4F-A9AA43FBE481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "FE1A8781-6B16-4D37-B556-36B99CBCA9F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "3EE11B43-1629-4A22-BE88-0AFB2DFC528C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_17:*:*:*:*:*:*",
              "matchCriteriaId": "10FC6F33-C031-40A4-AFAF-B5CF30F79E52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_18:*:*:*:*:*:*",
              "matchCriteriaId": "99B99578-CACE-47D2-9C1E-A7BBD2B6F6EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_19:*:*:*:*:*:*",
              "matchCriteriaId": "950D98A8-88EE-4C99-817B-C418071B2819",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "F86FF50F-B21A-4B6E-88B8-90D0C042E942",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_20:*:*:*:*:*:*",
              "matchCriteriaId": "CE0E1891-6E76-4069-B412-43B5E5379E0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_21:*:*:*:*:*:*",
              "matchCriteriaId": "404F5FFE-2758-452F-9297-40E0533C6FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_22:*:*:*:*:*:*",
              "matchCriteriaId": "3F5B7E72-8D62-464A-AA82-CBE2625C7687",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_23:*:*:*:*:*:*",
              "matchCriteriaId": "4FA67C68-3E8E-4383-967F-A1FA55AE4897",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_24:*:*:*:*:*:*",
              "matchCriteriaId": "F220793A-FDAC-48C6-B299-39EB3BC077A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_25:*:*:*:*:*:*",
              "matchCriteriaId": "F095A9E1-5FE1-46C4-B0E1-97F8767439D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_26:*:*:*:*:*:*",
              "matchCriteriaId": "DFD748DD-6FDB-44CD-96BF-026D18CE4207",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_27:*:*:*:*:*:*",
              "matchCriteriaId": "0A34F2EA-D0F7-4C9B-BFE6-DA334DFD0EDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_28:*:*:*:*:*:*",
              "matchCriteriaId": "4B3C2426-7617-4535-B86A-7F9BA45DFD0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_29:*:*:*:*:*:*",
              "matchCriteriaId": "88A5CBCE-2BAE-44C7-A7BF-BC30C89839BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "CA6B2500-42E4-4F87-8B93-2F7399B4F611",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_30:*:*:*:*:*:*",
              "matchCriteriaId": "28955834-8E02-4558-ABD3-4958DBB41423",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_31:*:*:*:*:*:*",
              "matchCriteriaId": "89B4F926-5018-4C50-9569-A92BEA6364A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_32:*:*:*:*:*:*",
              "matchCriteriaId": "863C4DBB-9BA2-4A13-8394-08AC500D552A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_33:*:*:*:*:*:*",
              "matchCriteriaId": "C4206C84-C4BD-4363-A4CA-EE229CE06319",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_34:*:*:*:*:*:*",
              "matchCriteriaId": "54CA9915-54C2-4E7F-85AF-781CA0A63A9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_35:*:*:*:*:*:*",
              "matchCriteriaId": "4F644864-1056-4A0C-ADD7-A1992A0AC07D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_36:*:*:*:*:*:*",
              "matchCriteriaId": "91E9BAE9-CD40-4353-95DB-7D9ADC338F95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_37:*:*:*:*:*:*",
              "matchCriteriaId": "C2A29CA0-66CB-4ED9-87B3-57A1C04F59F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_38:*:*:*:*:*:*",
              "matchCriteriaId": "2BFC882E-25C2-46A3-A0DA-A779399A3A30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_39:*:*:*:*:*:*",
              "matchCriteriaId": "661E68A2-B365-4962-87CF-CE17A500889F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "D4094372-E950-4DE0-86D2-CE7F214FD3A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_40:*:*:*:*:*:*",
              "matchCriteriaId": "A5D28279-002A-4BC7-9396-E47FC842D7AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_41:*:*:*:*:*:*",
              "matchCriteriaId": "C700ED72-4626-48A0-B1BB-E0A7C12D454F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_42:*:*:*:*:*:*",
              "matchCriteriaId": "8F473DF1-F70D-4EDB-A011-C8D1C6A21659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_43:*:*:*:*:*:*",
              "matchCriteriaId": "C2351EAC-F6AD-4611-B9BD-39C4DFE85B5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_44:*:*:*:*:*:*",
              "matchCriteriaId": "357845C1-3834-465A-B9CA-F9C604AA8242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_45:*:*:*:*:*:*",
              "matchCriteriaId": "DD35964D-4156-45B8-A0AB-282DA9F4FA47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_46:*:*:*:*:*:*",
              "matchCriteriaId": "35656567-EF24-4948-A72A-C754D6E419B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_47:*:*:*:*:*:*",
              "matchCriteriaId": "E9A3D95D-4539-432D-B241-376F312534AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_48:*:*:*:*:*:*",
              "matchCriteriaId": "81F329F1-5BB1-42A7-98CE-B0EB5819D60A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_49:*:*:*:*:*:*",
              "matchCriteriaId": "5B7111FA-9FD7-4952-AFE1-07D3E14854F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "D35916F1-24AA-4BF3-8B1F-2361C5B815D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_50:*:*:*:*:*:*",
              "matchCriteriaId": "2C7A080F-9C99-41A0-BC63-EBDDC0DF7B8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_51:*:*:*:*:*:*",
              "matchCriteriaId": "0383C4C4-A7BB-418D-9A98-AC4233722961",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_52:*:*:*:*:*:*",
              "matchCriteriaId": "AA281A20-7599-446B-9587-118E920403D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_53:*:*:*:*:*:*",
              "matchCriteriaId": "9514E8F5-1D0B-4CDF-BD03-087326F6C252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_54:*:*:*:*:*:*",
              "matchCriteriaId": "78BC7D6C-2A10-4F78-9C41-EA97665C246E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_55:*:*:*:*:*:*",
              "matchCriteriaId": "B2C29B11-D87B-4D78-9D42-AD528C811080",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_56:*:*:*:*:*:*",
              "matchCriteriaId": "CA9BE427-78D7-4DEE-A174-F3E3675B44A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_57:*:*:*:*:*:*",
              "matchCriteriaId": "6C10325C-8670-499B-B003-7D8634539C5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_58:*:*:*:*:*:*",
              "matchCriteriaId": "5F692BEB-5CB1-41EA-B715-64AB0036F6CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_59:*:*:*:*:*:*",
              "matchCriteriaId": "427C4DF5-9039-4CB5-B600-5F965E20D945",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "EDEE4B40-889C-472E-AA91-7E1B4314EE64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_60:*:*:*:*:*:*",
              "matchCriteriaId": "44B7A2A2-5764-4EDB-AA44-25F8508CF128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_61:*:*:*:*:*:*",
              "matchCriteriaId": "55D94917-5360-4179-A017-1287C63A6E6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_62:*:*:*:*:*:*",
              "matchCriteriaId": "52C5C76D-2572-4ADF-B7E4-7B3444935658",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_63:*:*:*:*:*:*",
              "matchCriteriaId": "9ABFC91A-7A8D-4A08-9464-F534BAA69B4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_64:*:*:*:*:*:*",
              "matchCriteriaId": "1D378A23-113D-47AC-9CB5-2658C357FFB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_65:*:*:*:*:*:*",
              "matchCriteriaId": "58FB119E-508C-45F7-8AD8-B67AAAEA53D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_66:*:*:*:*:*:*",
              "matchCriteriaId": "8B3359A5-D39B-4322-8963-B138D791D232",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_67:*:*:*:*:*:*",
              "matchCriteriaId": "E11E2FBD-7541-4CE3-8A78-52FB82571547",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_68:*:*:*:*:*:*",
              "matchCriteriaId": "3883F470-8D8D-4CB3-BF4A-0C401BDABC83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_69:*:*:*:*:*:*",
              "matchCriteriaId": "1BDCF010-04BF-4FA5-9E14-F6461FED3FFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "3867FDAA-354E-4D2F-A260-27F31CA44C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_70:*:*:*:*:*:*",
              "matchCriteriaId": "7E8CEA39-4A7F-4827-91FA-31119201D174",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_71:*:*:*:*:*:*",
              "matchCriteriaId": "D3768AC9-A245-4B81-8D1D-9D9C5354245C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_72:*:*:*:*:*:*",
              "matchCriteriaId": "71CA65C9-C0FC-4CBD-A8B0-DD72604A46F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_73:*:*:*:*:*:*",
              "matchCriteriaId": "9F06DECA-F45D-49DA-BB24-AA1F0306B0B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_74:*:*:*:*:*:*",
              "matchCriteriaId": "3BA69ED9-28FA-40B5-84F9-0FFE40DFC675",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_75:*:*:*:*:*:*",
              "matchCriteriaId": "6FF2D31F-8719-41A6-ADD5-15BE9409428E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_76:*:*:*:*:*:*",
              "matchCriteriaId": "DE56F5E5-73CF-4636-9F98-86BDDA3F6A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_77:*:*:*:*:*:*",
              "matchCriteriaId": "CE4885B1-F912-4D06-8179-830FC011F3F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_78:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0EFCE-4B74-4B4D-AB6E-5730F26B38FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_79:*:*:*:*:*:*",
              "matchCriteriaId": "F02DCC86-C3F7-482C-9BFB-B7971FB10AEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "A89B7EE4-57FD-4B09-841A-ABC9990FF88F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_80:*:*:*:*:*:*",
              "matchCriteriaId": "06835B0A-A2DF-44D3-A38F-59E5D5523FFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_81:*:*:*:*:*:*",
              "matchCriteriaId": "B746D0CF-76F6-42A1-9056-CA9622DCD806",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_82:*:*:*:*:*:*",
              "matchCriteriaId": "FFC33A7E-B1CB-4E83-B75C-71F5E7E5E406",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "27DF695E-B890-42C2-8941-5BB53154755F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
              "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update21:*:*:*:*:*:*",
              "matchCriteriaId": "22B6B8C1-1FF3-41BC-9576-16193AE20CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update34:*:*:*:*:*:*",
              "matchCriteriaId": "9D07DB20-9DCF-4C05-99D2-F6B37A082C14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update36:*:*:*:*:*:*",
              "matchCriteriaId": "1AB71307-7EAA-436A-9CBC-5A94F034FB48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update41:*:*:*:*:*:*",
              "matchCriteriaId": "2B256485-E289-4092-B45B-835DE12625B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update48:*:*:*:*:*:*",
              "matchCriteriaId": "67F50AF8-7B0E-4D01-9EB2-C6625E9DACB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*",
              "matchCriteriaId": "CCD1DEA0-8823-4780-B5EE-C1A2BB3C6B4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:*",
              "matchCriteriaId": "DC6FF5AB-B6E4-45D9-854B-29DEC200DA4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update62:*:*:*:*:*:*",
              "matchCriteriaId": "365F28B6-DBF2-45BB-A06D-DD80CFBAD7BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update67:*:*:*:*:*:*",
              "matchCriteriaId": "960F3F22-9CC8-4655-9B09-777E5A5A1239",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update76:*:*:*:*:*:*",
              "matchCriteriaId": "7E325115-EEBC-41F4-8606-45270DA40B98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*",
              "matchCriteriaId": "294D8A56-A797-433C-A06E-106B2179151A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*",
              "matchCriteriaId": "824D88D9-4645-4CAD-8CAB-30F27DD388C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*",
              "matchCriteriaId": "F6E8C952-B455-46E4-AC3D-D38CAF189F60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*",
              "matchCriteriaId": "CD77C0EE-AC79-4443-A502-C1E02F806911",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*",
              "matchCriteriaId": "648EB53C-7A90-4DA6-BF1C-B5336CDE30C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update86:*:*:*:*:*:*",
              "matchCriteriaId": "39835EF7-8E93-4695-973D-6E9B76C67372",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "67C00B28-3F41-49FA-87E0-130F77235C05",
              "versionEndExcluding": "7.4.3.88",
              "versionStartIncluding": "7.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stored cross-site scripting (XSS) vulnerability in the Wiki widget in Liferay Portal 7.1.0 through 7.4.3.87, and Liferay DXP 7.0 fix pack 83 through 102, 7.1 fix pack 28 and earlier, 7.2 fix pack 20 and earlier, 7.3 update 33 and earlier, and 7.4 before update 88 allows remote attackers to inject arbitrary web script or HTML into a parent wiki page via a crafted payload injected into a wiki page\u0027s \u2018Content\u2019 text field."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de Cross-Site Scripting (XSS) almacenadas en el widget Wiki en Liferay Portal 7.1.0 a 7.4.3.87 y Liferay DXP 7.0 fixpack 83 a 102, 7.1 fixpack 28 y anteriores, 7.2 fixpack 20 y anteriores, actualizaci\u00f3n 7.3 33 y anteriores, y 7.4 anterior a la actualizaci\u00f3n 88 permite a atacantes remotos inyectar scripts web o HTML arbitrarios en una p\u00e1gina wiki principal a trav\u00e9s de un payload manipulado inyectado en el campo de texto \u0027Content\u0027 de una p\u00e1gina wiki."
    }
  ],
  "id": "CVE-2023-42628",
  "lastModified": "2024-11-21T08:22:50.390",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.0,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 6.0,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-10-17T12:15:10.043",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-42628"
    },
    {
      "source": "security@liferay.com",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.pentagrid.ch/en/blog/stored-cross-site-scripting-vulnerabilities-in-liferay-portal/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-42628"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.pentagrid.ch/en/blog/stored-cross-site-scripting-vulnerabilities-in-liferay-portal/"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-10-22 15:15
Modified
2024-12-10 21:07
Summary
Cross-site request forgery (CSRF) vulnerability in the My Account widget in Liferay Portal 7.4.3.75 through 7.4.3.111, and Liferay DXP 2023.Q4.0 through 2023.Q4.2, 2023.Q3.1 through 2023.Q3.5, 7.4 update 75 through update 92 and 7.3 update 32 through update 36 allows remote attackers to (1) change user passwords, (2) shut down the server, (3) execute arbitrary code in the scripting console, (4) and perform other administrative actions via the _com_liferay_my_account_web_portlet_MyAccountPortlet_backURL parameter.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "935D404E-76A6-4405-8A74-0E70E50C3FCC",
              "versionEndExcluding": "2023.q3.6",
              "versionStartIncluding": "2023.q3.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3758E9CF-12EC-4025-85BB-1D5EEA99359A",
              "versionEndExcluding": "2023.q4.3",
              "versionStartIncluding": "2023.q4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update32:*:*:*:*:*:*",
              "matchCriteriaId": "660F37C6-61E6-4C34-8A7E-99C7DBEB8319",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update33:*:*:*:*:*:*",
              "matchCriteriaId": "5AD8D0D3-31AC-41E5-A780-5D5B18BF6991",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update34:*:*:*:*:*:*",
              "matchCriteriaId": "02D4C998-77F5-4428-A7B9-F7D909E23E92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update35:*:*:*:*:*:*",
              "matchCriteriaId": "C6984AC8-461D-488F-A911-7BF1D12B44A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update75:*:*:*:*:*:*",
              "matchCriteriaId": "BB5558B0-6714-4B3A-B287-1943517A975A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update76:*:*:*:*:*:*",
              "matchCriteriaId": "7E325115-EEBC-41F4-8606-45270DA40B98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update77:*:*:*:*:*:*",
              "matchCriteriaId": "848B2C72-447D-46E2-A5A7-43CF3764E578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update78:*:*:*:*:*:*",
              "matchCriteriaId": "26A0AF15-52A9-46FD-8157-359141332EAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update79:*:*:*:*:*:*",
              "matchCriteriaId": "63D63872-C1D0-444F-BCC7-A514F323C256",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update80:*:*:*:*:*:*",
              "matchCriteriaId": "9D9FA9AD-39D3-412A-B794-E1B29EEEEC4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*",
              "matchCriteriaId": "294D8A56-A797-433C-A06E-106B2179151A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*",
              "matchCriteriaId": "824D88D9-4645-4CAD-8CAB-30F27DD388C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*",
              "matchCriteriaId": "F6E8C952-B455-46E4-AC3D-D38CAF189F60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*",
              "matchCriteriaId": "CD77C0EE-AC79-4443-A502-C1E02F806911",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*",
              "matchCriteriaId": "648EB53C-7A90-4DA6-BF1C-B5336CDE30C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update86:*:*:*:*:*:*",
              "matchCriteriaId": "39835EF7-8E93-4695-973D-6E9B76C67372",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update87:*:*:*:*:*:*",
              "matchCriteriaId": "2A05FB86-332B-44E3-93CB-82465A38976E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update88:*:*:*:*:*:*",
              "matchCriteriaId": "7C754823-899C-4EEF-ACB7-E1551FA88B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update89:*:*:*:*:*:*",
              "matchCriteriaId": "493D4C18-DEE2-4040-9C13-3A9AB2CE47BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update90:*:*:*:*:*:*",
              "matchCriteriaId": "8F17DD75-E63B-4E4C-B136-D43F17B389EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update91:*:*:*:*:*:*",
              "matchCriteriaId": "62EE759A-78AD-40D6-8C5B-10403A8A4A89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update92:*:*:*:*:*:*",
              "matchCriteriaId": "865ABA1F-CA99-4602-B325-F81C9778855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEDE37FB-83BC-41D6-94D7-DE087BC4FE14",
              "versionEndExcluding": "7.4.3.112",
              "versionStartIncluding": "7.4.3.75",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site request forgery (CSRF) vulnerability in the My Account widget in Liferay Portal 7.4.3.75 through 7.4.3.111, and Liferay DXP 2023.Q4.0 through 2023.Q4.2, 2023.Q3.1 through 2023.Q3.5, 7.4 update 75 through update 92 and 7.3 update 32 through update 36 allows remote attackers to (1) change user passwords, (2) shut down the server, (3) execute arbitrary code in the scripting console, (4) and perform other administrative actions via the _com_liferay_my_account_web_portlet_MyAccountPortlet_backURL parameter."
    },
    {
      "lang": "es",
      "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en el widget Mi cuenta en Liferay Portal 7.4.3.75 a 7.4.3.111, y Liferay DXP 2023.Q4.0 a 2023.Q4.2, 2023.Q3.1 a 2023.Q3.5, 7.4 actualizaci\u00f3n 75 a 92 y 7.3 actualizaci\u00f3n 32 a 36 permite a atacantes remotos (1) cambiar las contrase\u00f1as de los usuarios, (2) apagar el servidor, (3) ejecutar c\u00f3digo arbitrario en la consola de scripts, (4) y realizar otras acciones administrativas a trav\u00e9s del par\u00e1metro _com_liferay_my_account_web_portlet_MyAccountPortlet_backURL."
    }
  ],
  "id": "CVE-2024-26271",
  "lastModified": "2024-12-10T21:07:04.467",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-10-22T15:15:05.523",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2024-26271"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-352"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-352"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-10-17 10:15
Modified
2024-11-21 08:25
Summary
Multiple reflected cross-site scripting (XSS) vulnerabilities in the Plugin for OAuth 2.0 module's OAuth2ProviderApplicationRedirect class in Liferay Portal 7.4.3.41 through 7.4.3.89, and Liferay DXP 7.4 update 41 through update 89 allow remote attackers to inject arbitrary web script or HTML via the (1) code, or (2) error parameter. This issue is caused by an incomplete fix in CVE-2023-33941.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update41:*:*:*:*:*:*",
              "matchCriteriaId": "2B256485-E289-4092-B45B-835DE12625B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update48:*:*:*:*:*:*",
              "matchCriteriaId": "67F50AF8-7B0E-4D01-9EB2-C6625E9DACB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*",
              "matchCriteriaId": "CCD1DEA0-8823-4780-B5EE-C1A2BB3C6B4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:*",
              "matchCriteriaId": "DC6FF5AB-B6E4-45D9-854B-29DEC200DA4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update62:*:*:*:*:*:*",
              "matchCriteriaId": "365F28B6-DBF2-45BB-A06D-DD80CFBAD7BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update67:*:*:*:*:*:*",
              "matchCriteriaId": "960F3F22-9CC8-4655-9B09-777E5A5A1239",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update76:*:*:*:*:*:*",
              "matchCriteriaId": "7E325115-EEBC-41F4-8606-45270DA40B98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*",
              "matchCriteriaId": "294D8A56-A797-433C-A06E-106B2179151A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*",
              "matchCriteriaId": "824D88D9-4645-4CAD-8CAB-30F27DD388C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*",
              "matchCriteriaId": "F6E8C952-B455-46E4-AC3D-D38CAF189F60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*",
              "matchCriteriaId": "CD77C0EE-AC79-4443-A502-C1E02F806911",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*",
              "matchCriteriaId": "648EB53C-7A90-4DA6-BF1C-B5336CDE30C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update86:*:*:*:*:*:*",
              "matchCriteriaId": "39835EF7-8E93-4695-973D-6E9B76C67372",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6204FB7B-6129-4E68-A811-6B51961C3D4A",
              "versionEndExcluding": "7.4.3.90",
              "versionStartIncluding": "7.4.3.41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple reflected cross-site scripting (XSS) vulnerabilities in the Plugin for OAuth 2.0 module\u0027s OAuth2ProviderApplicationRedirect class in Liferay Portal 7.4.3.41 through 7.4.3.89, and Liferay DXP 7.4 update 41 through update 89 allow remote attackers to inject arbitrary web script or HTML via the (1) code, or (2) error parameter. This issue is caused by an incomplete fix in CVE-2023-33941."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de Cross-Site Scripting (XSS) reflejadas en el complemento para la clase OAuth2ProviderApplicationRedirect del m\u00f3dulo OAuth 2.0 en Liferay Portal v7.4.3.41 a 7.4.3.89 y Liferay DXP 7.4 actualizaci\u00f3n 41 a 89 permiten a atacantes remotos inyectar script  web o HTML arbitrarios mediante el (1) c\u00f3digo o (2) el par\u00e1metro de error. Este problema se debe a una soluci\u00f3n incompleta en CVE-2023-33941."
    }
  ],
  "id": "CVE-2023-44311",
  "lastModified": "2024-11-21T08:25:38.623",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.6,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 6.0,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-10-17T10:15:09.947",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-44311"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-44311"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-11-15 01:15
Modified
2024-11-21 07:24
Summary
The Asset Libraries module in Liferay Portal 7.3.5 through 7.4.3.28, and Liferay DXP 7.3 before update 8, and DXP 7.4 before update 29 does not properly check permissions of asset libraries, which allows remote authenticated users to view asset libraries via the UI.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
              "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B67012C-9345-40B8-9FB4-CF7AF5116420",
              "versionEndExcluding": "7.4.3.29",
              "versionStartIncluding": "7.3.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Asset Libraries module in Liferay Portal 7.3.5 through 7.4.3.28, and Liferay DXP 7.3 before update 8, and DXP 7.4 before update 29 does not properly check permissions of asset libraries, which allows remote authenticated users to view asset libraries via the UI."
    },
    {
      "lang": "es",
      "value": "El m\u00f3dulo Asset Libraries en Liferay Portal 7.3.5 a 7.4.3.28, y Liferay DXP 7.3 antes de la actualizaci\u00f3n 8, y DXP 7.4 antes de la actualizaci\u00f3n 29 no verifica correctamente los permisos de las librer\u00edas de activos, lo que permite a los usuarios remotos autenticados ver las librer\u00edas de activos a trav\u00e9s de la interfaz de usuario."
    }
  ],
  "id": "CVE-2022-42126",
  "lastModified": "2024-11-21T07:24:25.027",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-11-15T01:15:13.267",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://issues.liferay.com/browse/LPE-17593"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42126"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://issues.liferay.com/browse/LPE-17593"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42126"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-04-19 13:15
Modified
2024-11-21 06:54
Summary
Liferay Portal 7.3.7, 7.4.0, and 7.4.1, and Liferay DXP 7.2 fix pack 13, and 7.3 fix pack 2 does not properly check user permission when accessing a list of sites/groups, which allows remote authenticated users to view sites/groups via the user's site membership assignment UI.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:7.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "174B6D58-FBEA-4D06-8FBA-DE08B0DC6111",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:7.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D77AE89B-3769-4AEC-AF7B-00AAE3F345F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:7.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A59A2D6-8E6C-4436-B1CC-D99C6A539E69",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Liferay Portal 7.3.7, 7.4.0, and 7.4.1, and Liferay DXP 7.2 fix pack 13, and 7.3 fix pack 2 does not properly check user permission when accessing a list of sites/groups, which allows remote authenticated users to view sites/groups via the user\u0027s site membership assignment UI."
    },
    {
      "lang": "es",
      "value": "Liferay Portal versiones 7.3.7, 7.4.0, y 7.4.1, y Liferay DXP versiones 7.2 fix pack 13, y 7.3 fix pack 2 no comprueban apropiadamente los permisos de usuarios cuando acceden a una lista de sitios/grupos, lo que permite a usuarios remotos autenticados visualizar sitios/grupos por medio de la UI de asignaci\u00f3n de miembros del sitio del usuario"
    }
  ],
  "id": "CVE-2022-26595",
  "lastModified": "2024-11-21T06:54:11.090",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 4.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-04-19T13:15:08.443",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-26595-unauthorized-access-to-site-group-list"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-26595-unauthorized-access-to-site-group-list"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-276"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-10-17 09:15
Modified
2024-11-21 08:22
Summary
Stored cross-site scripting (XSS) vulnerability in the manage vocabulary page in Liferay Portal 7.4.2 through 7.4.3.87, and Liferay DXP 7.4 before update 88 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a Vocabulary's 'description' text field.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
              "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update21:*:*:*:*:*:*",
              "matchCriteriaId": "22B6B8C1-1FF3-41BC-9576-16193AE20CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update34:*:*:*:*:*:*",
              "matchCriteriaId": "9D07DB20-9DCF-4C05-99D2-F6B37A082C14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update36:*:*:*:*:*:*",
              "matchCriteriaId": "1AB71307-7EAA-436A-9CBC-5A94F034FB48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update41:*:*:*:*:*:*",
              "matchCriteriaId": "2B256485-E289-4092-B45B-835DE12625B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update48:*:*:*:*:*:*",
              "matchCriteriaId": "67F50AF8-7B0E-4D01-9EB2-C6625E9DACB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*",
              "matchCriteriaId": "CCD1DEA0-8823-4780-B5EE-C1A2BB3C6B4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:*",
              "matchCriteriaId": "DC6FF5AB-B6E4-45D9-854B-29DEC200DA4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update62:*:*:*:*:*:*",
              "matchCriteriaId": "365F28B6-DBF2-45BB-A06D-DD80CFBAD7BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update67:*:*:*:*:*:*",
              "matchCriteriaId": "960F3F22-9CC8-4655-9B09-777E5A5A1239",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update76:*:*:*:*:*:*",
              "matchCriteriaId": "7E325115-EEBC-41F4-8606-45270DA40B98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*",
              "matchCriteriaId": "294D8A56-A797-433C-A06E-106B2179151A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*",
              "matchCriteriaId": "824D88D9-4645-4CAD-8CAB-30F27DD388C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*",
              "matchCriteriaId": "F6E8C952-B455-46E4-AC3D-D38CAF189F60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*",
              "matchCriteriaId": "CD77C0EE-AC79-4443-A502-C1E02F806911",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*",
              "matchCriteriaId": "648EB53C-7A90-4DA6-BF1C-B5336CDE30C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update86:*:*:*:*:*:*",
              "matchCriteriaId": "39835EF7-8E93-4695-973D-6E9B76C67372",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AD42484-BDB9-4ECE-B003-259B35FB0DE6",
              "versionEndExcluding": "7.4.3.88",
              "versionStartIncluding": "7.4.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stored cross-site scripting (XSS) vulnerability in the manage vocabulary page in Liferay Portal 7.4.2 through 7.4.3.87, and Liferay DXP 7.4 before update 88 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a Vocabulary\u0027s \u0027description\u0027 text field."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de Cross-Site Scripting (XSS) en la p\u00e1gina de gesti\u00f3n de vocabulario en Liferay Portal v7.4.2 hasta v7.4.3.87, y Liferay DXP v7.4 anterior a la actualizaci\u00f3n 88 permite a atacantes remotos inyectar script web o HTML arbitrario a trav\u00e9s de un payload manipulado inyectado en un vocabulario campo de texto \u0027description\u0027."
    }
  ],
  "id": "CVE-2023-42629",
  "lastModified": "2024-11-21T08:22:50.527",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.0,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 6.0,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-10-17T09:15:10.167",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-42629"
    },
    {
      "source": "security@liferay.com",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.pentagrid.ch/en/blog/stored-cross-site-scripting-vulnerabilities-in-liferay-portal/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-42629"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.pentagrid.ch/en/blog/stored-cross-site-scripting-vulnerabilities-in-liferay-portal/"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-11-15 01:15
Modified
2024-11-21 07:24
Summary
ReDoS vulnerability in LayoutPageTemplateEntryUpgradeProcess in Liferay Portal 7.3.2 through 7.4.3.4 and Liferay DXP 7.2 fix pack 9 through fix pack 18, 7.3 before update 4, and DXP 7.4 GA allows remote attackers to consume an excessive amount of server resources via a crafted payload injected into the 'name' field of a layout prototype.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "311EE92A-0EEF-4556-A52F-E6C9522FA2DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "49501C9E-D12A-45E0-92F3-8FD5FDC6D3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C01C7D38-BC12-4921-ADE6-799945887D66",
              "versionEndExcluding": "7.4.3.5",
              "versionStartIncluding": "7.3.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "ReDoS vulnerability in LayoutPageTemplateEntryUpgradeProcess in Liferay Portal 7.3.2 through 7.4.3.4 and Liferay DXP 7.2 fix pack 9 through fix pack 18, 7.3 before update 4, and DXP 7.4 GA allows remote attackers to consume an excessive amount of server resources via a crafted payload injected into the \u0027name\u0027 field of a layout prototype."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad ReDoS en LayoutPageTemplateEntryUpgradeProcess en Liferay Portal 7.3.2 hasta 7.4.3.4 y Liferay DXP 7.2 fix pack 9 hasta fix pack 18, 7.3 antes de la actualizaci\u00f3n 4 y DXP 7.4 GA permite a atacantes remotos consumir una cantidad excesiva de recursos del servidor a trav\u00e9s de un payload manipulado inyectado en el campo \u0027nombre\u0027 de un prototipo de dise\u00f1o."
    }
  ],
  "id": "CVE-2022-42124",
  "lastModified": "2024-11-21T07:24:24.717",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-11-15T01:15:13.123",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://issues.liferay.com/browse/LPE-17435"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://issues.liferay.com/browse/LPE-17535"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42124"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://issues.liferay.com/browse/LPE-17435"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://issues.liferay.com/browse/LPE-17535"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42124"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-1333"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-10-22 15:15
Modified
2024-12-10 21:07
Summary
Cross-site request forgery (CSRF) vulnerability in the content page editor in Liferay Portal 7.3.2 through 7.4.3.107, and Liferay DXP 2023.Q4.0 through 2023.Q4.2, 2023.Q3.1 through 2023.Q3.5, 7.4 GA through update 92 and 7.3 GA through update 35 allows remote attackers to (1) change user passwords, (2) shut down the server, (3) execute arbitrary code in the scripting console, (4) and perform other administrative actions via the p_l_back_url parameter.
Impacted products
Vendor Product Version
liferay digital_experience_platform *
liferay digital_experience_platform *
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay liferay_portal *
liferay liferay_portal *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "935D404E-76A6-4405-8A74-0E70E50C3FCC",
              "versionEndExcluding": "2023.q3.6",
              "versionStartIncluding": "2023.q3.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3758E9CF-12EC-4025-85BB-1D5EEA99359A",
              "versionEndExcluding": "2023.q4.3",
              "versionStartIncluding": "2023.q4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "728DF154-F19F-454C-87CA-1E755107F2A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update10:*:*:*:*:*:*",
              "matchCriteriaId": "AA984F92-4C6C-4049-A731-96F587B51E75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update11:*:*:*:*:*:*",
              "matchCriteriaId": "CADDF499-DDC4-4CEE-B512-404EA2024FCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update12:*:*:*:*:*:*",
              "matchCriteriaId": "9EC64246-1039-4009-B9BD-7828FA0FA1C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update13:*:*:*:*:*:*",
              "matchCriteriaId": "D9F352AE-AE22-4A84-94B6-6621D7E0BC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update14:*:*:*:*:*:*",
              "matchCriteriaId": "3E84D881-6D47-48FD-B743-9D531F5F7D5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update15:*:*:*:*:*:*",
              "matchCriteriaId": "1F8A9DEC-2C27-4EBB-B684-8EBDB374CFCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update16:*:*:*:*:*:*",
              "matchCriteriaId": "C3E7B777-8026-4C8F-9353-B5504873E0F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update17:*:*:*:*:*:*",
              "matchCriteriaId": "2207FEE5-2537-4C6E-AC9C-EC53DBF3C57E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update18:*:*:*:*:*:*",
              "matchCriteriaId": "087A2B43-07CE-4B3D-B879-449631DDA8D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update19:*:*:*:*:*:*",
              "matchCriteriaId": "019CED83-6277-434C-839C-6C4E0C45FB1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update20:*:*:*:*:*:*",
              "matchCriteriaId": "6C533124-74E6-4312-9AF7-6496DE2A5152",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update21:*:*:*:*:*:*",
              "matchCriteriaId": "8DDA248D-5F00-4FC1-B857-A7942BAA1F3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update22:*:*:*:*:*:*",
              "matchCriteriaId": "6C6BA174-69D4-43FC-9395-1B6306A44CDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update23:*:*:*:*:*:*",
              "matchCriteriaId": "A465C229-D3FB-43E9-87BE-119BEE9110F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update24:*:*:*:*:*:*",
              "matchCriteriaId": "32E98546-CE96-4BB8-A11C-F7E850C155F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update25:*:*:*:*:*:*",
              "matchCriteriaId": "DD43C626-F2F2-43BA-85AA-6ADAE8A6D11F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update26:*:*:*:*:*:*",
              "matchCriteriaId": "5C72C0E0-7D0B-4E8F-A109-7BB5DCA1C8D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update27:*:*:*:*:*:*",
              "matchCriteriaId": "7E796B04-FF54-4C02-979C-87E137A76F63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update28:*:*:*:*:*:*",
              "matchCriteriaId": "07C3D771-5E1B-46C4-AAF8-F425377582D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update29:*:*:*:*:*:*",
              "matchCriteriaId": "B08F95DC-BE49-4717-B959-2BE8BD131953",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update30:*:*:*:*:*:*",
              "matchCriteriaId": "E915FBC2-9BF7-4A99-B201-1F176D743494",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update31:*:*:*:*:*:*",
              "matchCriteriaId": "E44E02C2-6F83-4525-BF9D-E82CE9A9880E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update32:*:*:*:*:*:*",
              "matchCriteriaId": "660F37C6-61E6-4C34-8A7E-99C7DBEB8319",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update33:*:*:*:*:*:*",
              "matchCriteriaId": "5AD8D0D3-31AC-41E5-A780-5D5B18BF6991",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update34:*:*:*:*:*:*",
              "matchCriteriaId": "02D4C998-77F5-4428-A7B9-F7D909E23E92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update35:*:*:*:*:*:*",
              "matchCriteriaId": "C6984AC8-461D-488F-A911-7BF1D12B44A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update4:*:*:*:*:*:*",
              "matchCriteriaId": "AD408C73-7D78-4EB1-AA2C-F4A6D4DC980B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update5:*:*:*:*:*:*",
              "matchCriteriaId": "513F3229-7C31-44EB-88F6-E564BE725853",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update6:*:*:*:*:*:*",
              "matchCriteriaId": "76B9CD05-A10E-439C-9FDE-EA88EC3AF2C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update7:*:*:*:*:*:*",
              "matchCriteriaId": "A7D2D415-36AA-41B2-8FD9-21A98CDFE1EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update8:*:*:*:*:*:*",
              "matchCriteriaId": "124F2D2E-F8E7-4EDE-A98B-DD72FB43DF20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update9:*:*:*:*:*:*",
              "matchCriteriaId": "0DEE5985-289E-4138-B7C0-1E471BA7A1FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
              "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update10:*:*:*:*:*:*",
              "matchCriteriaId": "C7B02106-D5EA-4A59-A959-CCE2AC8F55BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update11:*:*:*:*:*:*",
              "matchCriteriaId": "80204464-5DC5-4A52-B844-C833A96E6BD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update12:*:*:*:*:*:*",
              "matchCriteriaId": "6F8A5D02-0B45-4DA9-ACD8-42C1BFF62827",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update13:*:*:*:*:*:*",
              "matchCriteriaId": "38DA7C99-AC2C-4B9A-B611-4697159E1D79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update14:*:*:*:*:*:*",
              "matchCriteriaId": "F264AD07-D105-4F00-8920-6D8146E4FA63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update15:*:*:*:*:*:*",
              "matchCriteriaId": "C929CF16-4725-492A-872B-0928FE388FC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update16:*:*:*:*:*:*",
              "matchCriteriaId": "1B8750A1-E481-48D4-84F4-97D1ABE15B46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update17:*:*:*:*:*:*",
              "matchCriteriaId": "454F8410-D9AC-481E-841C-60F0DF2CC25E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update18:*:*:*:*:*:*",
              "matchCriteriaId": "D1A442EE-460F-4823-B9EF-4421050F0847",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update19:*:*:*:*:*:*",
              "matchCriteriaId": "608B205D-0B79-4D1C-B2C1-64C31DB1896E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update2:*:*:*:*:*:*",
              "matchCriteriaId": "10B863B8-201D-494C-8175-168820996174",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update20:*:*:*:*:*:*",
              "matchCriteriaId": "4427DC78-E80C-4057-A295-B0731437A99E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update21:*:*:*:*:*:*",
              "matchCriteriaId": "22B6B8C1-1FF3-41BC-9576-16193AE20CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update22:*:*:*:*:*:*",
              "matchCriteriaId": "DDA17F24-1A7E-4BEB-9C98-41761A2A36A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update23:*:*:*:*:*:*",
              "matchCriteriaId": "3B062851-CE6B-44F4-8222-422EC9872EC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update24:*:*:*:*:*:*",
              "matchCriteriaId": "D4687FDA-0078-4E89-ADD8-7EDDA68261A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update25:*:*:*:*:*:*",
              "matchCriteriaId": "7EA29B09-CC24-4063-96A5-96AA08C0886D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update26:*:*:*:*:*:*",
              "matchCriteriaId": "331FC246-D3E9-4711-B305-BE51BF743CF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update27:*:*:*:*:*:*",
              "matchCriteriaId": "A5823BC0-8C11-4C31-9E99-3C9D82918E2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update28:*:*:*:*:*:*",
              "matchCriteriaId": "E2E6CB66-1AE1-4626-8070-64C250ED8363",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update29:*:*:*:*:*:*",
              "matchCriteriaId": "B63449AA-6831-4290-B1FA-0BB806820402",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update3:*:*:*:*:*:*",
              "matchCriteriaId": "CBF766CE-CBB8-472A-BAF0-BD39A7BCB4DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update30:*:*:*:*:*:*",
              "matchCriteriaId": "B3B169F6-B8B8-4612-AD7D-F75CC6A9297B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update31:*:*:*:*:*:*",
              "matchCriteriaId": "12D46756-D26D-4877-ACE8-1C2721908428",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update32:*:*:*:*:*:*",
              "matchCriteriaId": "5403DCEF-20C2-4568-8DF1-30804F522915",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update33:*:*:*:*:*:*",
              "matchCriteriaId": "90E39742-90BE-4DEB-AB78-F9B8F7333F9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update34:*:*:*:*:*:*",
              "matchCriteriaId": "9D07DB20-9DCF-4C05-99D2-F6B37A082C14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update35:*:*:*:*:*:*",
              "matchCriteriaId": "341D1157-8118-4BD3-A902-36E90E066706",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update36:*:*:*:*:*:*",
              "matchCriteriaId": "1AB71307-7EAA-436A-9CBC-5A94F034FB48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update37:*:*:*:*:*:*",
              "matchCriteriaId": "9446B3A5-6647-416C-92AF-7B6E0E929765",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update38:*:*:*:*:*:*",
              "matchCriteriaId": "06386C7A-CAA1-4FC4-9182-5A66342FB903",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update39:*:*:*:*:*:*",
              "matchCriteriaId": "8C84B701-B9A1-43D0-AF0C-30EDBD24CF90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update4:*:*:*:*:*:*",
              "matchCriteriaId": "182FAA46-D9FB-4170-B305-BAD0DF6E5DE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update40:*:*:*:*:*:*",
              "matchCriteriaId": "BA9AF651-D118-4437-B400-531B26BF6801",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update41:*:*:*:*:*:*",
              "matchCriteriaId": "2B256485-E289-4092-B45B-835DE12625B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update42:*:*:*:*:*:*",
              "matchCriteriaId": "119B54BD-75F4-46A4-A57D-16CFF4E12CEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update43:*:*:*:*:*:*",
              "matchCriteriaId": "A3382E2D-A414-40A1-A330-619859756A36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update44:*:*:*:*:*:*",
              "matchCriteriaId": "2E07B750-55B6-4DB6-B02B-216C2F5505A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update45:*:*:*:*:*:*",
              "matchCriteriaId": "B921E670-480F-4793-A636-3855A1654908",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update46:*:*:*:*:*:*",
              "matchCriteriaId": "62AE52FE-FB7F-4339-BDDE-E5AD235BBC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update47:*:*:*:*:*:*",
              "matchCriteriaId": "C99508DB-19E9-4832-AB38-57C61C7D68BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update48:*:*:*:*:*:*",
              "matchCriteriaId": "67F50AF8-7B0E-4D01-9EB2-C6625E9DACB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update49:*:*:*:*:*:*",
              "matchCriteriaId": "131E4E65-D997-47F1-8CB8-15CE6A60AB1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update5:*:*:*:*:*:*",
              "matchCriteriaId": "DF1BB9E6-D690-4C12-AEF0-4BD712869CBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*",
              "matchCriteriaId": "CCD1DEA0-8823-4780-B5EE-C1A2BB3C6B4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update51:*:*:*:*:*:*",
              "matchCriteriaId": "94AC684E-3C5F-4859-B6EB-42C478F9DD11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:*",
              "matchCriteriaId": "DC6FF5AB-B6E4-45D9-854B-29DEC200DA4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update53:*:*:*:*:*:*",
              "matchCriteriaId": "9855E3CB-925E-4623-A776-59422AB2FC6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update54:*:*:*:*:*:*",
              "matchCriteriaId": "01C3B7BE-1F9B-4EDA-990C-A4022CB85612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update55:*:*:*:*:*:*",
              "matchCriteriaId": "65CF766C-626D-4F8C-BDBF-F0C5404DD545",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update56:*:*:*:*:*:*",
              "matchCriteriaId": "720EF24C-9A36-405B-A380-6114C150B376",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update57:*:*:*:*:*:*",
              "matchCriteriaId": "44479EF5-40BD-43A2-AD0F-CE1660222AB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update58:*:*:*:*:*:*",
              "matchCriteriaId": "B8E0BD92-0F77-481E-8167-F81755E00703",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update59:*:*:*:*:*:*",
              "matchCriteriaId": "2BDB885E-814A-4CA8-A81C-1DB35989089B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update6:*:*:*:*:*:*",
              "matchCriteriaId": "653A0452-070F-4312-B94A-F5BCB01B9BDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update60:*:*:*:*:*:*",
              "matchCriteriaId": "B73DA1AE-C62F-4E62-AA98-5697656825F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update61:*:*:*:*:*:*",
              "matchCriteriaId": "D49DEE85-4DDB-4EF4-9F4D-11E7C1364055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update62:*:*:*:*:*:*",
              "matchCriteriaId": "365F28B6-DBF2-45BB-A06D-DD80CFBAD7BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update63:*:*:*:*:*:*",
              "matchCriteriaId": "5FDAD47C-C2DA-4533-AA58-DD6EC09A580A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update64:*:*:*:*:*:*",
              "matchCriteriaId": "5F81F36F-B20F-48B3-A1F2-3D319A34176B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update65:*:*:*:*:*:*",
              "matchCriteriaId": "754329CD-30B7-4410-A371-56A7C261B61B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update66:*:*:*:*:*:*",
              "matchCriteriaId": "C9445405-6B94-4DD1-BA94-B600AA316BB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update67:*:*:*:*:*:*",
              "matchCriteriaId": "960F3F22-9CC8-4655-9B09-777E5A5A1239",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update68:*:*:*:*:*:*",
              "matchCriteriaId": "D2B77C89-7F33-47A0-B6BF-473366033BEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update69:*:*:*:*:*:*",
              "matchCriteriaId": "8183B9D5-1C4D-4D30-BD85-13850FF34CB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update7:*:*:*:*:*:*",
              "matchCriteriaId": "15B67345-D0AF-4BFD-A62D-870F75306A4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update70:*:*:*:*:*:*",
              "matchCriteriaId": "1675366A-2388-4F7E-B423-D39BC7D3D38D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update71:*:*:*:*:*:*",
              "matchCriteriaId": "B93C3CF2-4F45-4F6C-AB6D-F9ABDA7C4DA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update72:*:*:*:*:*:*",
              "matchCriteriaId": "34A6A6A0-9307-4F5D-9605-1F786D1CD62A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update73:*:*:*:*:*:*",
              "matchCriteriaId": "6B994132-7103-4132-9D90-11CA264FEDE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update74:*:*:*:*:*:*",
              "matchCriteriaId": "A1958E04-AB8A-4B0E-AB45-B810CAED2EEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update75:*:*:*:*:*:*",
              "matchCriteriaId": "BB5558B0-6714-4B3A-B287-1943517A975A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update76:*:*:*:*:*:*",
              "matchCriteriaId": "7E325115-EEBC-41F4-8606-45270DA40B98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update77:*:*:*:*:*:*",
              "matchCriteriaId": "848B2C72-447D-46E2-A5A7-43CF3764E578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update78:*:*:*:*:*:*",
              "matchCriteriaId": "26A0AF15-52A9-46FD-8157-359141332EAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update79:*:*:*:*:*:*",
              "matchCriteriaId": "63D63872-C1D0-444F-BCC7-A514F323C256",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update8:*:*:*:*:*:*",
              "matchCriteriaId": "DE1F4262-A054-48CC-BF1D-AA77A94FFFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update80:*:*:*:*:*:*",
              "matchCriteriaId": "9D9FA9AD-39D3-412A-B794-E1B29EEEEC4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*",
              "matchCriteriaId": "294D8A56-A797-433C-A06E-106B2179151A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*",
              "matchCriteriaId": "824D88D9-4645-4CAD-8CAB-30F27DD388C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*",
              "matchCriteriaId": "F6E8C952-B455-46E4-AC3D-D38CAF189F60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*",
              "matchCriteriaId": "CD77C0EE-AC79-4443-A502-C1E02F806911",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*",
              "matchCriteriaId": "648EB53C-7A90-4DA6-BF1C-B5336CDE30C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update86:*:*:*:*:*:*",
              "matchCriteriaId": "39835EF7-8E93-4695-973D-6E9B76C67372",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update87:*:*:*:*:*:*",
              "matchCriteriaId": "2A05FB86-332B-44E3-93CB-82465A38976E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update88:*:*:*:*:*:*",
              "matchCriteriaId": "7C754823-899C-4EEF-ACB7-E1551FA88B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update89:*:*:*:*:*:*",
              "matchCriteriaId": "493D4C18-DEE2-4040-9C13-3A9AB2CE47BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update9:*:*:*:*:*:*",
              "matchCriteriaId": "D176CECA-2821-49EA-86EC-1184C133C0A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update90:*:*:*:*:*:*",
              "matchCriteriaId": "8F17DD75-E63B-4E4C-B136-D43F17B389EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update91:*:*:*:*:*:*",
              "matchCriteriaId": "62EE759A-78AD-40D6-8C5B-10403A8A4A89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update92:*:*:*:*:*:*",
              "matchCriteriaId": "865ABA1F-CA99-4602-B325-F81C9778855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F2C2272-3E19-4836-BCA5-660208D5985D",
              "versionEndIncluding": "7.3.7",
              "versionStartIncluding": "7.3.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23EB185-798C-4F89-8AAA-6D229BCD8BA4",
              "versionEndExcluding": "7.4.3.108",
              "versionStartIncluding": "7.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site request forgery (CSRF) vulnerability in the content page editor in Liferay Portal 7.3.2 through 7.4.3.107, and Liferay DXP 2023.Q4.0 through 2023.Q4.2, 2023.Q3.1 through 2023.Q3.5, 7.4 GA through update 92 and 7.3 GA through update 35 allows remote attackers to (1) change user passwords, (2) shut down the server, (3) execute arbitrary code in the scripting console, (4) and perform other administrative actions via the p_l_back_url parameter."
    },
    {
      "lang": "es",
      "value": " La vulnerabilidad de Cross-Site Request Forgery (CSRF) en el editor de p\u00e1ginas de contenido en Liferay Portal 7.3.2 a 7.4.3.107, y Liferay DXP 2023.Q4.0 a 2023.Q4.2, 2023.Q3.1 a 2023.Q3.5, 7.4 GA a la actualizaci\u00f3n 92 y 7.3 GA a la actualizaci\u00f3n 35 permite a atacantes remotos (1) cambiar las contrase\u00f1as de los usuarios, (2) apagar el servidor, (3) ejecutar c\u00f3digo arbitrario en la consola de scripts, (4) y realizar otras acciones administrativas a trav\u00e9s del par\u00e1metro p_l_back_url."
    }
  ],
  "id": "CVE-2024-26272",
  "lastModified": "2024-12-10T21:07:02.180",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-10-22T15:15:05.740",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2024-26272"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-352"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-352"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-03-03 00:15
Modified
2024-11-21 06:51
Summary
The Remote App module in Liferay Portal Liferay Portal v7.4.3.4 through v7.4.3.8 and Liferay DXP 7.4 before update 5 does not check if the origin of event messages it receives matches the origin of the Remote App, allowing attackers to exfiltrate the CSRF token via a crafted event message.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F7BCC0B-5F36-4E6B-AABE-61B88E9A99D8",
              "versionEndIncluding": "7.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D590E39-35BB-476C-B08E-ABFDF4C201BF",
              "versionEndExcluding": "7.4.3.9",
              "versionStartIncluding": "7.4.3.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Remote App module in Liferay Portal Liferay Portal v7.4.3.4 through v7.4.3.8 and Liferay DXP 7.4 before update 5 does not check if the origin of event messages it receives matches the origin of the Remote App, allowing attackers to exfiltrate the CSRF token via a crafted event message."
    },
    {
      "lang": "es",
      "value": "El m\u00f3dulo Remote App en Liferay Portal Liferay Portal v7.4.3.4 hasta v7.4.3.8 y Liferay DXP 7.4 antes de la actualizaci\u00f3n 5 no comprueba si el origen de los mensajes de evento que recibe coincide con el origen de la Remote App, permitiendo a los atacantes exfiltrar el token CSRF a trav\u00e9s de un mensaje de evento crafteado"
    }
  ],
  "id": "CVE-2022-25146",
  "lastModified": "2024-11-21T06:51:41.503",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-03-03T00:15:08.617",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-25146-csrf-token-exfiltration-via-remote-apps"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Not Applicable",
        "Third Party Advisory"
      ],
      "url": "https://www.securitum.pl"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-25146-csrf-token-exfiltration-via-remote-apps"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Not Applicable",
        "Third Party Advisory"
      ],
      "url": "https://www.securitum.pl"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-346"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-11-15 02:15
Modified
2024-11-21 07:24
Summary
The Dynamic Data Mapping module in Liferay Portal 7.1.0 through 7.4.3.4, and Liferay DXP 7.1 before fix pack 27, 7.2 before fix pack 19, 7.3 before update 4, and 7.4 GA does not properly check permission of form entries, which allows remote authenticated users to view and access all form entries.
Impacted products
Vendor Product Version
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.4
liferay liferay_portal *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "27DF695E-B890-42C2-8941-5BB53154755F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "072F6C59-3D86-48D1-A14E-477FFFA3B1D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "FE68B4A2-3459-4DBA-8BAC-E9AA9FA25264",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "680D7963-1393-4E86-A65F-D4463D532120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "D81E73DD-FD21-4082-A883-34422AE6C024",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "E6DD0451-98EA-4140-8294-77A14F063E2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "CE94E76B-8CC2-4E91-B7A3-EEBCC1358FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "408BD438-E15C-422F-9612-C62A7387FC63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "A78C8B1C-39CB-4C27-B57C-0AF5E7EB50D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_17:*:*:*:*:*:*",
              "matchCriteriaId": "0AB19E97-BACE-4FCC-A53F-078D61A7A9E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_18:*:*:*:*:*:*",
              "matchCriteriaId": "D18ACD28-9182-435C-A30F-DF3BFE13C39A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_19:*:*:*:*:*:*",
              "matchCriteriaId": "CFE4CC72-C15A-40DE-AFF4-0B6B79BFB2BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "386F0E26-78DC-4D59-A20F-B41D0E59561B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_20:*:*:*:*:*:*",
              "matchCriteriaId": "43C11288-1C48-47A0-95DF-A48F3C0285F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_21:*:*:*:*:*:*",
              "matchCriteriaId": "5ECF3B18-D0DB-4FB6-9F6F-B63A6CE45081",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_22:*:*:*:*:*:*",
              "matchCriteriaId": "79AC7C0B-4135-4C24-8D37-A9431156E3E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_23:*:*:*:*:*:*",
              "matchCriteriaId": "7289F71D-ECEB-4FB9-A53F-D3F4D1315ADD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_24:*:*:*:*:*:*",
              "matchCriteriaId": "C18AE68F-6EF0-4132-A3D8-C2D77A842137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_25:*:*:*:*:*:*",
              "matchCriteriaId": "4C5F0729-7B44-4B9E-949F-6A66D8176E11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_26:*:*:*:*:*:*",
              "matchCriteriaId": "B883C27E-3C14-4686-A0E8-8969B4246CDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "54576481-2AE9-4133-9EFA-B7FBDCA4427D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "E29CE810-76D5-4283-B102-70344B6C9506",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "DA869467-C560-4130-A180-86819F6A8673",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "CC0C94B7-31FB-4115-8EDE-62CC459B6663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "07DEAA71-53DA-4508-B7E6-924ABED49E66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "467323F6-5CA7-42A0-9810-C6FA694CEC93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "32EFFD8A-1C0D-446B-AAD7-5D23D483D3D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "311EE92A-0EEF-4556-A52F-E6C9522FA2DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "49501C9E-D12A-45E0-92F3-8FD5FDC6D3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F52D52E3-9D1D-4CF7-84B8-6EFEF2F05434",
              "versionEndExcluding": "7.4.3.5",
              "versionStartIncluding": "7.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Dynamic Data Mapping module in Liferay Portal 7.1.0 through 7.4.3.4, and Liferay DXP 7.1 before fix pack 27, 7.2 before fix pack 19, 7.3 before update 4, and 7.4 GA does not properly check permission of form entries, which allows remote authenticated users to view and access all form entries."
    },
    {
      "lang": "es",
      "value": "El m\u00f3dulo Dynamic Data Mapping en Liferay Portal 7.1.0 a 7.4.3.4 y Liferay DXP 7.1 antes del fixpack 27, 7.2 antes del fixpack 19, 7.3 antes de la actualizaci\u00f3n 4 y 7.4 GA no comprueba correctamente el permiso de las entradas del formulario, lo que permite usuarios remotos autenticados para ver y acceder a todas las entradas del formulario."
    }
  ],
  "id": "CVE-2022-42130",
  "lastModified": "2024-11-21T07:24:25.640",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-11-15T02:15:11.873",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://issues.liferay.com/browse/LPE-17447"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42130"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://issues.liferay.com/browse/LPE-17447"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42130"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-276"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-20 07:15
Modified
2024-12-10 23:03
Summary
Liferay Portal 7.2.0 through 7.4.1, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 15, and older unsupported versions does not properly restrict membership of a child site when the "Limit membership to members of the parent site" option is enabled, which allows remote authenticated users to add users who are not a member of the parent site to a child site. The added user may obtain permission to perform unauthorized actions in the child site.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459",
              "versionEndExcluding": "7.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "43F61E2F-4643-4D5D-84DB-7B7B6E93C67B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "8B057D81-7589-4007-9A0D-2D302B82F9CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "6F0F2558-6990-43D7-9FE2-8E99D81B8269",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "11072673-C3AB-42EA-A26F-890DEE903D42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "134560B0-9746-4EC3-8DE3-26E53E2CAC6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "69440C19-B9E7-41F3-B731-B5C7E37C718A",
              "versionEndExcluding": "7.4.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Liferay Portal 7.2.0 through 7.4.1, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 15, and older unsupported versions does not properly restrict membership of a child site when the \"Limit membership to members of the parent site\" option is enabled, which allows remote authenticated users to add users who are not a member of the parent site to a child site. The added user may obtain permission to perform unauthorized actions in the child site."
    },
    {
      "lang": "es",
      "value": "Liferay Portal 7.2.0 a 7.4.1 y versiones anteriores no compatibles, y Liferay DXP 7.3 anterior al service pack 3, 7.2 anterior al fix pack 15 y versiones anteriores no compatibles no restringen adecuadamente la membres\u00eda de un sitio secundario cuando la opci\u00f3n \"Limitar membres\u00eda a miembros del sitio principal\" est\u00e1 habilitada, lo que permite a los usuarios autenticados remotamente agregar usuarios que no son miembros del sitio principal a un sitio secundario. El usuario agregado puede obtener permiso para realizar acciones no autorizadas en el sitio secundario."
    }
  ],
  "id": "CVE-2024-25149",
  "lastModified": "2024-12-10T23:03:54.853",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.5,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.5,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-20T07:15:10.557",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25149"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25149"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-863"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-863"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-10-22 15:15
Modified
2024-12-10 21:07
Summary
Cross-site request forgery (CSRF) vulnerability in the content page editor in Liferay Portal 7.4.0 through 7.4.3.103, and Liferay DXP 2023.Q4.0 through 2023.Q4.2, 2023.Q3.1 through 2023.Q3.5, 7.4 GA through update 92 and 7.3 update 29 through update 35 allows remote attackers to (1) change user passwords, (2) shut down the server, (3) execute arbitrary code in the scripting console, (4) and perform other administrative actions via the _com_liferay_commerce_catalog_web_internal_portlet_CommerceCatalogsPortlet_redirect parameter.
Impacted products
Vendor Product Version
liferay digital_experience_platform *
liferay digital_experience_platform *
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay liferay_portal *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "935D404E-76A6-4405-8A74-0E70E50C3FCC",
              "versionEndExcluding": "2023.q3.6",
              "versionStartIncluding": "2023.q3.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3758E9CF-12EC-4025-85BB-1D5EEA99359A",
              "versionEndExcluding": "2023.q4.3",
              "versionStartIncluding": "2023.q4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update29:*:*:*:*:*:*",
              "matchCriteriaId": "B08F95DC-BE49-4717-B959-2BE8BD131953",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update30:*:*:*:*:*:*",
              "matchCriteriaId": "E915FBC2-9BF7-4A99-B201-1F176D743494",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update31:*:*:*:*:*:*",
              "matchCriteriaId": "E44E02C2-6F83-4525-BF9D-E82CE9A9880E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update32:*:*:*:*:*:*",
              "matchCriteriaId": "660F37C6-61E6-4C34-8A7E-99C7DBEB8319",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update33:*:*:*:*:*:*",
              "matchCriteriaId": "5AD8D0D3-31AC-41E5-A780-5D5B18BF6991",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update34:*:*:*:*:*:*",
              "matchCriteriaId": "02D4C998-77F5-4428-A7B9-F7D909E23E92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update35:*:*:*:*:*:*",
              "matchCriteriaId": "C6984AC8-461D-488F-A911-7BF1D12B44A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
              "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update10:*:*:*:*:*:*",
              "matchCriteriaId": "C7B02106-D5EA-4A59-A959-CCE2AC8F55BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update11:*:*:*:*:*:*",
              "matchCriteriaId": "80204464-5DC5-4A52-B844-C833A96E6BD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update12:*:*:*:*:*:*",
              "matchCriteriaId": "6F8A5D02-0B45-4DA9-ACD8-42C1BFF62827",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update13:*:*:*:*:*:*",
              "matchCriteriaId": "38DA7C99-AC2C-4B9A-B611-4697159E1D79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update14:*:*:*:*:*:*",
              "matchCriteriaId": "F264AD07-D105-4F00-8920-6D8146E4FA63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update15:*:*:*:*:*:*",
              "matchCriteriaId": "C929CF16-4725-492A-872B-0928FE388FC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update16:*:*:*:*:*:*",
              "matchCriteriaId": "1B8750A1-E481-48D4-84F4-97D1ABE15B46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update17:*:*:*:*:*:*",
              "matchCriteriaId": "454F8410-D9AC-481E-841C-60F0DF2CC25E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update18:*:*:*:*:*:*",
              "matchCriteriaId": "D1A442EE-460F-4823-B9EF-4421050F0847",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update19:*:*:*:*:*:*",
              "matchCriteriaId": "608B205D-0B79-4D1C-B2C1-64C31DB1896E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update2:*:*:*:*:*:*",
              "matchCriteriaId": "10B863B8-201D-494C-8175-168820996174",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update20:*:*:*:*:*:*",
              "matchCriteriaId": "4427DC78-E80C-4057-A295-B0731437A99E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update21:*:*:*:*:*:*",
              "matchCriteriaId": "22B6B8C1-1FF3-41BC-9576-16193AE20CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update22:*:*:*:*:*:*",
              "matchCriteriaId": "DDA17F24-1A7E-4BEB-9C98-41761A2A36A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update23:*:*:*:*:*:*",
              "matchCriteriaId": "3B062851-CE6B-44F4-8222-422EC9872EC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update24:*:*:*:*:*:*",
              "matchCriteriaId": "D4687FDA-0078-4E89-ADD8-7EDDA68261A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update25:*:*:*:*:*:*",
              "matchCriteriaId": "7EA29B09-CC24-4063-96A5-96AA08C0886D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update26:*:*:*:*:*:*",
              "matchCriteriaId": "331FC246-D3E9-4711-B305-BE51BF743CF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update27:*:*:*:*:*:*",
              "matchCriteriaId": "A5823BC0-8C11-4C31-9E99-3C9D82918E2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update28:*:*:*:*:*:*",
              "matchCriteriaId": "E2E6CB66-1AE1-4626-8070-64C250ED8363",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update29:*:*:*:*:*:*",
              "matchCriteriaId": "B63449AA-6831-4290-B1FA-0BB806820402",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update3:*:*:*:*:*:*",
              "matchCriteriaId": "CBF766CE-CBB8-472A-BAF0-BD39A7BCB4DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update30:*:*:*:*:*:*",
              "matchCriteriaId": "B3B169F6-B8B8-4612-AD7D-F75CC6A9297B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update31:*:*:*:*:*:*",
              "matchCriteriaId": "12D46756-D26D-4877-ACE8-1C2721908428",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update32:*:*:*:*:*:*",
              "matchCriteriaId": "5403DCEF-20C2-4568-8DF1-30804F522915",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update33:*:*:*:*:*:*",
              "matchCriteriaId": "90E39742-90BE-4DEB-AB78-F9B8F7333F9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update34:*:*:*:*:*:*",
              "matchCriteriaId": "9D07DB20-9DCF-4C05-99D2-F6B37A082C14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update35:*:*:*:*:*:*",
              "matchCriteriaId": "341D1157-8118-4BD3-A902-36E90E066706",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update36:*:*:*:*:*:*",
              "matchCriteriaId": "1AB71307-7EAA-436A-9CBC-5A94F034FB48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update37:*:*:*:*:*:*",
              "matchCriteriaId": "9446B3A5-6647-416C-92AF-7B6E0E929765",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update38:*:*:*:*:*:*",
              "matchCriteriaId": "06386C7A-CAA1-4FC4-9182-5A66342FB903",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update39:*:*:*:*:*:*",
              "matchCriteriaId": "8C84B701-B9A1-43D0-AF0C-30EDBD24CF90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update4:*:*:*:*:*:*",
              "matchCriteriaId": "182FAA46-D9FB-4170-B305-BAD0DF6E5DE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update40:*:*:*:*:*:*",
              "matchCriteriaId": "BA9AF651-D118-4437-B400-531B26BF6801",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update41:*:*:*:*:*:*",
              "matchCriteriaId": "2B256485-E289-4092-B45B-835DE12625B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update42:*:*:*:*:*:*",
              "matchCriteriaId": "119B54BD-75F4-46A4-A57D-16CFF4E12CEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update43:*:*:*:*:*:*",
              "matchCriteriaId": "A3382E2D-A414-40A1-A330-619859756A36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update44:*:*:*:*:*:*",
              "matchCriteriaId": "2E07B750-55B6-4DB6-B02B-216C2F5505A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update45:*:*:*:*:*:*",
              "matchCriteriaId": "B921E670-480F-4793-A636-3855A1654908",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update46:*:*:*:*:*:*",
              "matchCriteriaId": "62AE52FE-FB7F-4339-BDDE-E5AD235BBC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update47:*:*:*:*:*:*",
              "matchCriteriaId": "C99508DB-19E9-4832-AB38-57C61C7D68BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update48:*:*:*:*:*:*",
              "matchCriteriaId": "67F50AF8-7B0E-4D01-9EB2-C6625E9DACB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update49:*:*:*:*:*:*",
              "matchCriteriaId": "131E4E65-D997-47F1-8CB8-15CE6A60AB1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update5:*:*:*:*:*:*",
              "matchCriteriaId": "DF1BB9E6-D690-4C12-AEF0-4BD712869CBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*",
              "matchCriteriaId": "CCD1DEA0-8823-4780-B5EE-C1A2BB3C6B4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update51:*:*:*:*:*:*",
              "matchCriteriaId": "94AC684E-3C5F-4859-B6EB-42C478F9DD11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:*",
              "matchCriteriaId": "DC6FF5AB-B6E4-45D9-854B-29DEC200DA4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update53:*:*:*:*:*:*",
              "matchCriteriaId": "9855E3CB-925E-4623-A776-59422AB2FC6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update54:*:*:*:*:*:*",
              "matchCriteriaId": "01C3B7BE-1F9B-4EDA-990C-A4022CB85612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update55:*:*:*:*:*:*",
              "matchCriteriaId": "65CF766C-626D-4F8C-BDBF-F0C5404DD545",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update56:*:*:*:*:*:*",
              "matchCriteriaId": "720EF24C-9A36-405B-A380-6114C150B376",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update57:*:*:*:*:*:*",
              "matchCriteriaId": "44479EF5-40BD-43A2-AD0F-CE1660222AB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update58:*:*:*:*:*:*",
              "matchCriteriaId": "B8E0BD92-0F77-481E-8167-F81755E00703",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update59:*:*:*:*:*:*",
              "matchCriteriaId": "2BDB885E-814A-4CA8-A81C-1DB35989089B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update6:*:*:*:*:*:*",
              "matchCriteriaId": "653A0452-070F-4312-B94A-F5BCB01B9BDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update60:*:*:*:*:*:*",
              "matchCriteriaId": "B73DA1AE-C62F-4E62-AA98-5697656825F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update61:*:*:*:*:*:*",
              "matchCriteriaId": "D49DEE85-4DDB-4EF4-9F4D-11E7C1364055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update62:*:*:*:*:*:*",
              "matchCriteriaId": "365F28B6-DBF2-45BB-A06D-DD80CFBAD7BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update63:*:*:*:*:*:*",
              "matchCriteriaId": "5FDAD47C-C2DA-4533-AA58-DD6EC09A580A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update64:*:*:*:*:*:*",
              "matchCriteriaId": "5F81F36F-B20F-48B3-A1F2-3D319A34176B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update65:*:*:*:*:*:*",
              "matchCriteriaId": "754329CD-30B7-4410-A371-56A7C261B61B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update66:*:*:*:*:*:*",
              "matchCriteriaId": "C9445405-6B94-4DD1-BA94-B600AA316BB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update67:*:*:*:*:*:*",
              "matchCriteriaId": "960F3F22-9CC8-4655-9B09-777E5A5A1239",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update68:*:*:*:*:*:*",
              "matchCriteriaId": "D2B77C89-7F33-47A0-B6BF-473366033BEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update69:*:*:*:*:*:*",
              "matchCriteriaId": "8183B9D5-1C4D-4D30-BD85-13850FF34CB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update7:*:*:*:*:*:*",
              "matchCriteriaId": "15B67345-D0AF-4BFD-A62D-870F75306A4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update70:*:*:*:*:*:*",
              "matchCriteriaId": "1675366A-2388-4F7E-B423-D39BC7D3D38D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update71:*:*:*:*:*:*",
              "matchCriteriaId": "B93C3CF2-4F45-4F6C-AB6D-F9ABDA7C4DA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update72:*:*:*:*:*:*",
              "matchCriteriaId": "34A6A6A0-9307-4F5D-9605-1F786D1CD62A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update73:*:*:*:*:*:*",
              "matchCriteriaId": "6B994132-7103-4132-9D90-11CA264FEDE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update74:*:*:*:*:*:*",
              "matchCriteriaId": "A1958E04-AB8A-4B0E-AB45-B810CAED2EEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update75:*:*:*:*:*:*",
              "matchCriteriaId": "BB5558B0-6714-4B3A-B287-1943517A975A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update76:*:*:*:*:*:*",
              "matchCriteriaId": "7E325115-EEBC-41F4-8606-45270DA40B98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update77:*:*:*:*:*:*",
              "matchCriteriaId": "848B2C72-447D-46E2-A5A7-43CF3764E578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update78:*:*:*:*:*:*",
              "matchCriteriaId": "26A0AF15-52A9-46FD-8157-359141332EAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update79:*:*:*:*:*:*",
              "matchCriteriaId": "63D63872-C1D0-444F-BCC7-A514F323C256",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update8:*:*:*:*:*:*",
              "matchCriteriaId": "DE1F4262-A054-48CC-BF1D-AA77A94FFFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update80:*:*:*:*:*:*",
              "matchCriteriaId": "9D9FA9AD-39D3-412A-B794-E1B29EEEEC4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*",
              "matchCriteriaId": "294D8A56-A797-433C-A06E-106B2179151A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*",
              "matchCriteriaId": "824D88D9-4645-4CAD-8CAB-30F27DD388C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*",
              "matchCriteriaId": "F6E8C952-B455-46E4-AC3D-D38CAF189F60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*",
              "matchCriteriaId": "CD77C0EE-AC79-4443-A502-C1E02F806911",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*",
              "matchCriteriaId": "648EB53C-7A90-4DA6-BF1C-B5336CDE30C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update86:*:*:*:*:*:*",
              "matchCriteriaId": "39835EF7-8E93-4695-973D-6E9B76C67372",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update87:*:*:*:*:*:*",
              "matchCriteriaId": "2A05FB86-332B-44E3-93CB-82465A38976E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update88:*:*:*:*:*:*",
              "matchCriteriaId": "7C754823-899C-4EEF-ACB7-E1551FA88B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update89:*:*:*:*:*:*",
              "matchCriteriaId": "493D4C18-DEE2-4040-9C13-3A9AB2CE47BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update9:*:*:*:*:*:*",
              "matchCriteriaId": "D176CECA-2821-49EA-86EC-1184C133C0A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update90:*:*:*:*:*:*",
              "matchCriteriaId": "8F17DD75-E63B-4E4C-B136-D43F17B389EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update91:*:*:*:*:*:*",
              "matchCriteriaId": "62EE759A-78AD-40D6-8C5B-10403A8A4A89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update92:*:*:*:*:*:*",
              "matchCriteriaId": "865ABA1F-CA99-4602-B325-F81C9778855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BF93004-E003-45A8-A84A-86710D138F3F",
              "versionEndExcluding": "7.4.3.104",
              "versionStartIncluding": "7.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site request forgery (CSRF) vulnerability in the content page editor in Liferay Portal 7.4.0 through 7.4.3.103, and Liferay DXP 2023.Q4.0 through 2023.Q4.2, 2023.Q3.1 through 2023.Q3.5, 7.4 GA through update 92 and 7.3 update 29 through update 35 allows remote attackers to (1) change user passwords, (2) shut down the server, (3) execute arbitrary code in the scripting console, (4) and perform other administrative actions via the _com_liferay_commerce_catalog_web_internal_portlet_CommerceCatalogsPortlet_redirect parameter."
    },
    {
      "lang": "es",
      "value": "La vulnerabilidad de Cross-Site Request Forgery (CSRF) en el editor de p\u00e1ginas de contenido en Liferay Portal 7.4.0 a 7.4.3.103, y Liferay DXP 2023.Q4.0 a 2023.Q4.2, 2023.Q3.1 a 2023.Q3.5, 7.4 GA a la actualizaci\u00f3n 92 y 7.3 actualizaci\u00f3n 29 a la actualizaci\u00f3n 35 permite a atacantes remotos (1) cambiar las contrase\u00f1as de los usuarios, (2) apagar el servidor, (3) ejecutar c\u00f3digo arbitrario en la consola de scripts, (4) y realizar otras acciones administrativas a trav\u00e9s del par\u00e1metro _com_liferay_commerce_catalog_web_internal_portlet_CommerceCatalogsPortlet_redirect."
    }
  ],
  "id": "CVE-2024-26273",
  "lastModified": "2024-12-10T21:07:07.587",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-10-22T15:15:05.937",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2024-26273"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-352"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-352"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-21 02:15
Modified
2025-01-28 21:26
Summary
Stored cross-site scripting (XSS) vulnerability in Users Admin module's edit user page in Liferay Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 17, and older unsupported versions allows remote authenticated users to inject arbitrary web script or HTML via a crafted payload injected into an organization’s “Name” text field



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "831BFAEF-E7B6-4E84-9142-79B93FBA0E8A",
              "versionEndExcluding": "7.4.3.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459",
              "versionEndExcluding": "7.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "311EE92A-0EEF-4556-A52F-E6C9522FA2DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "49501C9E-D12A-45E0-92F3-8FD5FDC6D3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "43F61E2F-4643-4D5D-84DB-7B7B6E93C67B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "8B057D81-7589-4007-9A0D-2D302B82F9CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "6F0F2558-6990-43D7-9FE2-8E99D81B8269",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "11072673-C3AB-42EA-A26F-890DEE903D42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "134560B0-9746-4EC3-8DE3-26E53E2CAC6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stored cross-site scripting (XSS) vulnerability in Users Admin module\u0027s edit user page in Liferay Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 17, and older unsupported versions allows remote authenticated users to inject arbitrary web script or HTML via a crafted payload injected into an organization\u2019s \u201cName\u201d text field"
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de Cross-site scripting (XSS) almacenadas en la p\u00e1gina de edici\u00f3n de usuario del m\u00f3dulo Users Admin en Liferay Portal 7.2.0 a 7.4.2 y versiones anteriores no compatibles, y Liferay DXP 7.3 anteriores al service pack 3, 7.2 anteriores al fix pack 17 y anteriores no compatibles Las versiones permiten a usuarios remotos autenticados inyectar script web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el campo de texto \"Nombre\" de una organizaci\u00f3n."
    }
  ],
  "id": "CVE-2024-25602",
  "lastModified": "2025-01-28T21:26:27.113",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.0,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 6.0,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-21T02:15:30.267",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25602"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25602"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-10-17 09:15
Modified
2024-11-21 08:25
Summary
Multiple stored cross-site scripting (XSS) vulnerabilities in the fragment components in Liferay Portal 7.4.2 through 7.4.3.53, and Liferay DXP 7.4 before update 54 allow remote attackers to inject arbitrary web script or HTML via a crafted payload injected into any non-HTML field of a linked source asset.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
              "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update21:*:*:*:*:*:*",
              "matchCriteriaId": "22B6B8C1-1FF3-41BC-9576-16193AE20CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update34:*:*:*:*:*:*",
              "matchCriteriaId": "9D07DB20-9DCF-4C05-99D2-F6B37A082C14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update36:*:*:*:*:*:*",
              "matchCriteriaId": "1AB71307-7EAA-436A-9CBC-5A94F034FB48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update41:*:*:*:*:*:*",
              "matchCriteriaId": "2B256485-E289-4092-B45B-835DE12625B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update48:*:*:*:*:*:*",
              "matchCriteriaId": "67F50AF8-7B0E-4D01-9EB2-C6625E9DACB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*",
              "matchCriteriaId": "CCD1DEA0-8823-4780-B5EE-C1A2BB3C6B4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:*",
              "matchCriteriaId": "DC6FF5AB-B6E4-45D9-854B-29DEC200DA4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "96FC68D1-4118-42AB-B167-864FB0B4152D",
              "versionEndExcluding": "7.4.3.53",
              "versionStartIncluding": "7.4.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple stored cross-site scripting (XSS) vulnerabilities in the fragment components in Liferay Portal 7.4.2 through 7.4.3.53, and Liferay DXP 7.4 before update 54 allow remote attackers to inject arbitrary web script or HTML via a crafted payload injected into any non-HTML field of a linked source asset."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de Cross-Site Scripting (XSS) almacenadas en los componentes de fragmentos en Liferay Portal v7.4.2 hasta 7.4.3.53 y Liferay DXP 7.4 anterior a la actualizaci\u00f3n 54 permiten a atacantes remotos inyectar script web o HTML arbitrario a trav\u00e9s de un payload manipulado inyectado en cualquier campo no-HTML de un recurso de origen vinculado."
    }
  ],
  "id": "CVE-2023-44309",
  "lastModified": "2024-11-21T08:25:38.360",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.0,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 6.0,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-10-17T09:15:10.347",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-44309"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-44309"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-21 03:15
Modified
2025-01-28 02:31
Summary
Cross-site scripting (XSS) vulnerability in the Frontend JS module's portlet.js in Liferay Portal 7.2.0 through 7.4.3.37, and Liferay DXP 7.4 before update 38, 7.3 before update 11, 7.2 before fix pack 20, and older unsupported versions allows remote attackers to inject arbitrary web script or HTML via the anchor (hash) part of a URL.
Impacted products
Vendor Product Version
liferay liferay_portal *
liferay digital_experience_platform *
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CEECF72-6A24-43F5-BB80-6A2B38922920",
              "versionEndExcluding": "7.4.3.38",
              "versionStartIncluding": "7.2.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459",
              "versionEndExcluding": "7.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "311EE92A-0EEF-4556-A52F-E6C9522FA2DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "49501C9E-D12A-45E0-92F3-8FD5FDC6D3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_17:*:*:*:*:*:*",
              "matchCriteriaId": "F2B55C77-9FAA-4E14-8CEF-9C4CAC804007",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_18:*:*:*:*:*:*",
              "matchCriteriaId": "54E499E6-C747-476B-BFE2-C04D9F8744F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_19:*:*:*:*:*:*",
              "matchCriteriaId": "6A773FC6-429D-483D-9736-25323B55A71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "43F61E2F-4643-4D5D-84DB-7B7B6E93C67B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "8B057D81-7589-4007-9A0D-2D302B82F9CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "6F0F2558-6990-43D7-9FE2-8E99D81B8269",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "11072673-C3AB-42EA-A26F-890DEE903D42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "134560B0-9746-4EC3-8DE3-26E53E2CAC6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "71E41E59-D71F-48F0-812B-39D59F81997B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "B6AAAAF1-994E-409D-8FC7-DE2A2CF60AD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "728DF154-F19F-454C-87CA-1E755107F2A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update10:*:*:*:*:*:*",
              "matchCriteriaId": "AA984F92-4C6C-4049-A731-96F587B51E75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update4:*:*:*:*:*:*",
              "matchCriteriaId": "AD408C73-7D78-4EB1-AA2C-F4A6D4DC980B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update5:*:*:*:*:*:*",
              "matchCriteriaId": "513F3229-7C31-44EB-88F6-E564BE725853",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update6:*:*:*:*:*:*",
              "matchCriteriaId": "76B9CD05-A10E-439C-9FDE-EA88EC3AF2C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update7:*:*:*:*:*:*",
              "matchCriteriaId": "A7D2D415-36AA-41B2-8FD9-21A98CDFE1EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update8:*:*:*:*:*:*",
              "matchCriteriaId": "124F2D2E-F8E7-4EDE-A98B-DD72FB43DF20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update9:*:*:*:*:*:*",
              "matchCriteriaId": "0DEE5985-289E-4138-B7C0-1E471BA7A1FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
              "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update10:*:*:*:*:*:*",
              "matchCriteriaId": "C7B02106-D5EA-4A59-A959-CCE2AC8F55BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update11:*:*:*:*:*:*",
              "matchCriteriaId": "80204464-5DC5-4A52-B844-C833A96E6BD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update12:*:*:*:*:*:*",
              "matchCriteriaId": "6F8A5D02-0B45-4DA9-ACD8-42C1BFF62827",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update13:*:*:*:*:*:*",
              "matchCriteriaId": "38DA7C99-AC2C-4B9A-B611-4697159E1D79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update14:*:*:*:*:*:*",
              "matchCriteriaId": "F264AD07-D105-4F00-8920-6D8146E4FA63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update15:*:*:*:*:*:*",
              "matchCriteriaId": "C929CF16-4725-492A-872B-0928FE388FC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update16:*:*:*:*:*:*",
              "matchCriteriaId": "1B8750A1-E481-48D4-84F4-97D1ABE15B46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update17:*:*:*:*:*:*",
              "matchCriteriaId": "454F8410-D9AC-481E-841C-60F0DF2CC25E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update18:*:*:*:*:*:*",
              "matchCriteriaId": "D1A442EE-460F-4823-B9EF-4421050F0847",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update19:*:*:*:*:*:*",
              "matchCriteriaId": "608B205D-0B79-4D1C-B2C1-64C31DB1896E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update2:*:*:*:*:*:*",
              "matchCriteriaId": "10B863B8-201D-494C-8175-168820996174",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update20:*:*:*:*:*:*",
              "matchCriteriaId": "4427DC78-E80C-4057-A295-B0731437A99E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update21:*:*:*:*:*:*",
              "matchCriteriaId": "22B6B8C1-1FF3-41BC-9576-16193AE20CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update22:*:*:*:*:*:*",
              "matchCriteriaId": "DDA17F24-1A7E-4BEB-9C98-41761A2A36A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update23:*:*:*:*:*:*",
              "matchCriteriaId": "3B062851-CE6B-44F4-8222-422EC9872EC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update24:*:*:*:*:*:*",
              "matchCriteriaId": "D4687FDA-0078-4E89-ADD8-7EDDA68261A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update25:*:*:*:*:*:*",
              "matchCriteriaId": "7EA29B09-CC24-4063-96A5-96AA08C0886D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update26:*:*:*:*:*:*",
              "matchCriteriaId": "331FC246-D3E9-4711-B305-BE51BF743CF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update27:*:*:*:*:*:*",
              "matchCriteriaId": "A5823BC0-8C11-4C31-9E99-3C9D82918E2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update28:*:*:*:*:*:*",
              "matchCriteriaId": "E2E6CB66-1AE1-4626-8070-64C250ED8363",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update29:*:*:*:*:*:*",
              "matchCriteriaId": "B63449AA-6831-4290-B1FA-0BB806820402",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update3:*:*:*:*:*:*",
              "matchCriteriaId": "CBF766CE-CBB8-472A-BAF0-BD39A7BCB4DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update30:*:*:*:*:*:*",
              "matchCriteriaId": "B3B169F6-B8B8-4612-AD7D-F75CC6A9297B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update31:*:*:*:*:*:*",
              "matchCriteriaId": "12D46756-D26D-4877-ACE8-1C2721908428",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update32:*:*:*:*:*:*",
              "matchCriteriaId": "5403DCEF-20C2-4568-8DF1-30804F522915",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update33:*:*:*:*:*:*",
              "matchCriteriaId": "90E39742-90BE-4DEB-AB78-F9B8F7333F9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update34:*:*:*:*:*:*",
              "matchCriteriaId": "9D07DB20-9DCF-4C05-99D2-F6B37A082C14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update35:*:*:*:*:*:*",
              "matchCriteriaId": "341D1157-8118-4BD3-A902-36E90E066706",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update36:*:*:*:*:*:*",
              "matchCriteriaId": "1AB71307-7EAA-436A-9CBC-5A94F034FB48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update37:*:*:*:*:*:*",
              "matchCriteriaId": "9446B3A5-6647-416C-92AF-7B6E0E929765",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update4:*:*:*:*:*:*",
              "matchCriteriaId": "182FAA46-D9FB-4170-B305-BAD0DF6E5DE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update5:*:*:*:*:*:*",
              "matchCriteriaId": "DF1BB9E6-D690-4C12-AEF0-4BD712869CBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update6:*:*:*:*:*:*",
              "matchCriteriaId": "653A0452-070F-4312-B94A-F5BCB01B9BDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update7:*:*:*:*:*:*",
              "matchCriteriaId": "15B67345-D0AF-4BFD-A62D-870F75306A4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update8:*:*:*:*:*:*",
              "matchCriteriaId": "DE1F4262-A054-48CC-BF1D-AA77A94FFFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update9:*:*:*:*:*:*",
              "matchCriteriaId": "D176CECA-2821-49EA-86EC-1184C133C0A3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the Frontend JS module\u0027s portlet.js in Liferay Portal 7.2.0 through 7.4.3.37, and Liferay DXP 7.4 before update 38, 7.3 before update 11, 7.2 before fix pack 20, and older unsupported versions allows remote attackers to inject arbitrary web script or HTML via the anchor (hash) part of a URL."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de Cross-site scripting (XSS) en el portlet.js del m\u00f3dulo Frontend JS en Liferay Portal 7.2.0 hasta 7.4.3.37 y Liferay DXP 7.4 antes de la actualizaci\u00f3n 38, 7.3 antes de la actualizaci\u00f3n 11, 7.2 antes del fixpack 20 y versiones anteriores no compatibles permite a atacantes remotos inyectar script web o HTML arbitrario a trav\u00e9s de la parte de anclaje (hash) de una URL."
    }
  ],
  "id": "CVE-2024-26269",
  "lastModified": "2025-01-28T02:31:06.663",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.6,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 6.0,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-21T03:15:09.527",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-26269"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-26269"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-21 03:15
Modified
2025-01-28 02:39
Summary
Stored cross-site scripting (XSS) vulnerability in the Dynamic Data Mapping module's DDMForm in Liferay Portal 7.2.0 through 7.4.3.4, and older unsupported versions, and Liferay DXP 7.4.13, 7.3 before update 4, 7.2 before fix pack 17, and older unsupported versions allows remote authenticated users to inject arbitrary web script or HTML via the instanceId parameter.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2503ABB2-4B09-4118-890B-02CD00535F27",
              "versionEndExcluding": "7.4.3.5",
              "versionStartIncluding": "7.2.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459",
              "versionEndExcluding": "7.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "311EE92A-0EEF-4556-A52F-E6C9522FA2DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "49501C9E-D12A-45E0-92F3-8FD5FDC6D3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "43F61E2F-4643-4D5D-84DB-7B7B6E93C67B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "8B057D81-7589-4007-9A0D-2D302B82F9CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "6F0F2558-6990-43D7-9FE2-8E99D81B8269",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "11072673-C3AB-42EA-A26F-890DEE903D42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "134560B0-9746-4EC3-8DE3-26E53E2CAC6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "728DF154-F19F-454C-87CA-1E755107F2A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stored cross-site scripting (XSS) vulnerability in the Dynamic Data Mapping module\u0027s DDMForm in Liferay Portal 7.2.0 through 7.4.3.4, and older unsupported versions, and Liferay DXP 7.4.13, 7.3 before update 4, 7.2 before fix pack 17, and older unsupported versions allows remote authenticated users to inject arbitrary web script or HTML via the instanceId parameter."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de Cross-site scripting (XSS) almacenadas en el DDMForm del m\u00f3dulo Dynamic Data Mapping en Liferay Portal 7.2.0 a 7.4.3.4 y versiones anteriores no compatibles, y Liferay DXP 7.4.13, 7.3 antes de la actualizaci\u00f3n 4, 7.2 antes del fixpack 17, y las versiones anteriores no compatibles permiten a los usuarios autenticados remotamente inyectar script web o HTML arbitrario a trav\u00e9s del par\u00e1metrostanceId."
    }
  ],
  "id": "CVE-2024-25603",
  "lastModified": "2025-01-28T02:39:55.360",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.0,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 6.0,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-21T03:15:09.173",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25603"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25603"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-20 09:15
Modified
2024-12-11 14:27
Summary
XXE vulnerability in Liferay Portal 7.2.0 through 7.4.3.7, and older unsupported versions, and Liferay DXP 7.4 before update 4, 7.3 before update 12, 7.2 before fix pack 20, and older unsupported versions allows attackers with permission to deploy widgets/portlets/extensions to obtain sensitive information or consume system resources via the Java2WsddTask._format method.
Impacted products
Vendor Product Version
liferay digital_experience_platform *
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay liferay_portal *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459",
              "versionEndExcluding": "7.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "311EE92A-0EEF-4556-A52F-E6C9522FA2DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "49501C9E-D12A-45E0-92F3-8FD5FDC6D3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_17:*:*:*:*:*:*",
              "matchCriteriaId": "F2B55C77-9FAA-4E14-8CEF-9C4CAC804007",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_18:*:*:*:*:*:*",
              "matchCriteriaId": "54E499E6-C747-476B-BFE2-C04D9F8744F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_19:*:*:*:*:*:*",
              "matchCriteriaId": "6A773FC6-429D-483D-9736-25323B55A71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "43F61E2F-4643-4D5D-84DB-7B7B6E93C67B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "8B057D81-7589-4007-9A0D-2D302B82F9CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "6F0F2558-6990-43D7-9FE2-8E99D81B8269",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "11072673-C3AB-42EA-A26F-890DEE903D42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "134560B0-9746-4EC3-8DE3-26E53E2CAC6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "71E41E59-D71F-48F0-812B-39D59F81997B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "B6AAAAF1-994E-409D-8FC7-DE2A2CF60AD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "728DF154-F19F-454C-87CA-1E755107F2A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update10:*:*:*:*:*:*",
              "matchCriteriaId": "AA984F92-4C6C-4049-A731-96F587B51E75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update11:*:*:*:*:*:*",
              "matchCriteriaId": "CADDF499-DDC4-4CEE-B512-404EA2024FCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update4:*:*:*:*:*:*",
              "matchCriteriaId": "AD408C73-7D78-4EB1-AA2C-F4A6D4DC980B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update5:*:*:*:*:*:*",
              "matchCriteriaId": "513F3229-7C31-44EB-88F6-E564BE725853",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update6:*:*:*:*:*:*",
              "matchCriteriaId": "76B9CD05-A10E-439C-9FDE-EA88EC3AF2C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update7:*:*:*:*:*:*",
              "matchCriteriaId": "A7D2D415-36AA-41B2-8FD9-21A98CDFE1EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update8:*:*:*:*:*:*",
              "matchCriteriaId": "124F2D2E-F8E7-4EDE-A98B-DD72FB43DF20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update9:*:*:*:*:*:*",
              "matchCriteriaId": "0DEE5985-289E-4138-B7C0-1E471BA7A1FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
              "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update2:*:*:*:*:*:*",
              "matchCriteriaId": "10B863B8-201D-494C-8175-168820996174",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update3:*:*:*:*:*:*",
              "matchCriteriaId": "CBF766CE-CBB8-472A-BAF0-BD39A7BCB4DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEC6590B-9ECD-4B86-A964-0824C7F129EB",
              "versionEndExcluding": "7.4.3.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "XXE vulnerability in Liferay Portal 7.2.0 through 7.4.3.7, and older unsupported versions, and Liferay DXP 7.4 before update 4, 7.3 before update 12, 7.2 before fix pack 20, and older unsupported versions allows attackers with permission to deploy widgets/portlets/extensions to obtain sensitive information or consume system resources via the Java2WsddTask._format method."
    },
    {
      "lang": "es",
      "value": "La vulnerabilidad XXE en Liferay Portal 7.2.0 a 7.4.3.7 y versiones anteriores no compatibles, y Liferay DXP 7.4 antes de la actualizaci\u00f3n 4, 7.3 antes de la actualizaci\u00f3n 12, 7.2 antes del fixpack 20 y versiones anteriores no compatibles permite a atacantes con permiso implementar widgets/portlets /extensiones para obtener informaci\u00f3n confidencial o consumir recursos del sistema a trav\u00e9s del m\u00e9todo Java2WsddTask._format."
    }
  ],
  "id": "CVE-2024-25606",
  "lastModified": "2024-12-11T14:27:37.600",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.0,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.3,
        "impactScore": 6.0,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.7,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 5.8,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-20T09:15:09.533",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25606"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25606"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-611"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-611"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-20 10:15
Modified
2024-12-11 17:55
Summary
HtmlUtil.escapeRedirect in Liferay Portal 7.2.0 through 7.4.3.12, and older unsupported versions, and Liferay DXP 7.4 before update 9, 7.3 service pack 3, 7.2 fix pack 15 through 18, and older unsupported versions can be circumvented by using two forward slashes, which allows remote attackers to redirect users to arbitrary external URLs via the (1) 'redirect` parameter (2) `FORWARD_URL` parameter, and (3) others parameters that rely on HtmlUtil.escapeRedirect. This vulnerability is the result of an incomplete fix in CVE-2022-28977.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459",
              "versionEndExcluding": "7.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "311EE92A-0EEF-4556-A52F-E6C9522FA2DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "49501C9E-D12A-45E0-92F3-8FD5FDC6D3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_17:*:*:*:*:*:*",
              "matchCriteriaId": "F2B55C77-9FAA-4E14-8CEF-9C4CAC804007",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_18:*:*:*:*:*:*",
              "matchCriteriaId": "54E499E6-C747-476B-BFE2-C04D9F8744F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "43F61E2F-4643-4D5D-84DB-7B7B6E93C67B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "8B057D81-7589-4007-9A0D-2D302B82F9CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "6F0F2558-6990-43D7-9FE2-8E99D81B8269",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "11072673-C3AB-42EA-A26F-890DEE903D42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "134560B0-9746-4EC3-8DE3-26E53E2CAC6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "71E41E59-D71F-48F0-812B-39D59F81997B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "728DF154-F19F-454C-87CA-1E755107F2A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
              "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update2:*:*:*:*:*:*",
              "matchCriteriaId": "10B863B8-201D-494C-8175-168820996174",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update3:*:*:*:*:*:*",
              "matchCriteriaId": "CBF766CE-CBB8-472A-BAF0-BD39A7BCB4DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update4:*:*:*:*:*:*",
              "matchCriteriaId": "182FAA46-D9FB-4170-B305-BAD0DF6E5DE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update5:*:*:*:*:*:*",
              "matchCriteriaId": "DF1BB9E6-D690-4C12-AEF0-4BD712869CBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update6:*:*:*:*:*:*",
              "matchCriteriaId": "653A0452-070F-4312-B94A-F5BCB01B9BDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update7:*:*:*:*:*:*",
              "matchCriteriaId": "15B67345-D0AF-4BFD-A62D-870F75306A4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update8:*:*:*:*:*:*",
              "matchCriteriaId": "DE1F4262-A054-48CC-BF1D-AA77A94FFFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F2855EC-0F83-4119-95BB-709C414D7E05",
              "versionEndExcluding": "7.4.3.13",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "HtmlUtil.escapeRedirect in Liferay Portal 7.2.0 through 7.4.3.12, and older unsupported versions, and Liferay DXP 7.4 before update 9, 7.3 service pack 3, 7.2 fix pack 15 through 18, and older unsupported versions can be circumvented by using two forward slashes, which allows remote attackers to redirect users to arbitrary external URLs via the (1) \u0027redirect` parameter (2) `FORWARD_URL` parameter, and (3) others parameters that rely on HtmlUtil.escapeRedirect. This vulnerability is the result of an incomplete fix in CVE-2022-28977."
    },
    {
      "lang": "es",
      "value": "HtmlUtil.escapeRedirect en Liferay Portal 7.2.0 a 7.4.3.12 y versiones anteriores no compatibles, y Liferay DXP 7.4 anterior a la actualizaci\u00f3n 9, 7.3 service pack 3, 7.2 fixpack 15 a 18 y versiones anteriores no compatibles se pueden eludir usando dos barras diagonales, que permiten a atacantes remotos redirigir a los usuarios a URL externas arbitrarias a trav\u00e9s del (1) par\u00e1metro \u0027redirect` (2) el par\u00e1metro `FORWARD_URL` y (3) otros par\u00e1metros que dependen de HtmlUtil.escapeRedirect. Esta vulnerabilidad es el resultado de una soluci\u00f3n incompleta en CVE-2022-28977."
    }
  ],
  "id": "CVE-2024-25609",
  "lastModified": "2024-12-11T17:55:21.677",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-20T10:15:08.707",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25609"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25609"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-601"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-601"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-21 03:15
Modified
2025-01-28 02:54
Summary
Reflected cross-site scripting (XSS) vulnerability on the add assignees to a role page in Liferay Portal 7.3.3 through 7.4.3.97, and Liferay DXP 2023.Q3 before patch 6, 7.4 GA through update 92, and 7.3 before update 34 allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_roles_admin_web_portlet_RolesAdminPortlet_tabs2 parameter.
Impacted products
Vendor Product Version
liferay liferay_portal *
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EED129E-9461-45BF-9936-040F51B759D6",
              "versionEndExcluding": "7.4.3.98",
              "versionStartIncluding": "7.3.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "728DF154-F19F-454C-87CA-1E755107F2A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update10:*:*:*:*:*:*",
              "matchCriteriaId": "AA984F92-4C6C-4049-A731-96F587B51E75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update11:*:*:*:*:*:*",
              "matchCriteriaId": "CADDF499-DDC4-4CEE-B512-404EA2024FCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update12:*:*:*:*:*:*",
              "matchCriteriaId": "9EC64246-1039-4009-B9BD-7828FA0FA1C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update13:*:*:*:*:*:*",
              "matchCriteriaId": "D9F352AE-AE22-4A84-94B6-6621D7E0BC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update14:*:*:*:*:*:*",
              "matchCriteriaId": "3E84D881-6D47-48FD-B743-9D531F5F7D5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update15:*:*:*:*:*:*",
              "matchCriteriaId": "1F8A9DEC-2C27-4EBB-B684-8EBDB374CFCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update16:*:*:*:*:*:*",
              "matchCriteriaId": "C3E7B777-8026-4C8F-9353-B5504873E0F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update17:*:*:*:*:*:*",
              "matchCriteriaId": "2207FEE5-2537-4C6E-AC9C-EC53DBF3C57E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update18:*:*:*:*:*:*",
              "matchCriteriaId": "087A2B43-07CE-4B3D-B879-449631DDA8D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update19:*:*:*:*:*:*",
              "matchCriteriaId": "019CED83-6277-434C-839C-6C4E0C45FB1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update20:*:*:*:*:*:*",
              "matchCriteriaId": "6C533124-74E6-4312-9AF7-6496DE2A5152",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update21:*:*:*:*:*:*",
              "matchCriteriaId": "8DDA248D-5F00-4FC1-B857-A7942BAA1F3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update22:*:*:*:*:*:*",
              "matchCriteriaId": "6C6BA174-69D4-43FC-9395-1B6306A44CDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update23:*:*:*:*:*:*",
              "matchCriteriaId": "A465C229-D3FB-43E9-87BE-119BEE9110F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update24:*:*:*:*:*:*",
              "matchCriteriaId": "32E98546-CE96-4BB8-A11C-F7E850C155F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update25:*:*:*:*:*:*",
              "matchCriteriaId": "DD43C626-F2F2-43BA-85AA-6ADAE8A6D11F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update26:*:*:*:*:*:*",
              "matchCriteriaId": "5C72C0E0-7D0B-4E8F-A109-7BB5DCA1C8D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update27:*:*:*:*:*:*",
              "matchCriteriaId": "7E796B04-FF54-4C02-979C-87E137A76F63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update28:*:*:*:*:*:*",
              "matchCriteriaId": "07C3D771-5E1B-46C4-AAF8-F425377582D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update29:*:*:*:*:*:*",
              "matchCriteriaId": "B08F95DC-BE49-4717-B959-2BE8BD131953",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update30:*:*:*:*:*:*",
              "matchCriteriaId": "E915FBC2-9BF7-4A99-B201-1F176D743494",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update31:*:*:*:*:*:*",
              "matchCriteriaId": "E44E02C2-6F83-4525-BF9D-E82CE9A9880E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update32:*:*:*:*:*:*",
              "matchCriteriaId": "660F37C6-61E6-4C34-8A7E-99C7DBEB8319",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update33:*:*:*:*:*:*",
              "matchCriteriaId": "5AD8D0D3-31AC-41E5-A780-5D5B18BF6991",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update4:*:*:*:*:*:*",
              "matchCriteriaId": "AD408C73-7D78-4EB1-AA2C-F4A6D4DC980B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update5:*:*:*:*:*:*",
              "matchCriteriaId": "513F3229-7C31-44EB-88F6-E564BE725853",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update6:*:*:*:*:*:*",
              "matchCriteriaId": "76B9CD05-A10E-439C-9FDE-EA88EC3AF2C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update7:*:*:*:*:*:*",
              "matchCriteriaId": "A7D2D415-36AA-41B2-8FD9-21A98CDFE1EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update8:*:*:*:*:*:*",
              "matchCriteriaId": "124F2D2E-F8E7-4EDE-A98B-DD72FB43DF20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update9:*:*:*:*:*:*",
              "matchCriteriaId": "0DEE5985-289E-4138-B7C0-1E471BA7A1FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
              "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update10:*:*:*:*:*:*",
              "matchCriteriaId": "C7B02106-D5EA-4A59-A959-CCE2AC8F55BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update11:*:*:*:*:*:*",
              "matchCriteriaId": "80204464-5DC5-4A52-B844-C833A96E6BD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update12:*:*:*:*:*:*",
              "matchCriteriaId": "6F8A5D02-0B45-4DA9-ACD8-42C1BFF62827",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update13:*:*:*:*:*:*",
              "matchCriteriaId": "38DA7C99-AC2C-4B9A-B611-4697159E1D79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update14:*:*:*:*:*:*",
              "matchCriteriaId": "F264AD07-D105-4F00-8920-6D8146E4FA63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update15:*:*:*:*:*:*",
              "matchCriteriaId": "C929CF16-4725-492A-872B-0928FE388FC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update16:*:*:*:*:*:*",
              "matchCriteriaId": "1B8750A1-E481-48D4-84F4-97D1ABE15B46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update17:*:*:*:*:*:*",
              "matchCriteriaId": "454F8410-D9AC-481E-841C-60F0DF2CC25E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update18:*:*:*:*:*:*",
              "matchCriteriaId": "D1A442EE-460F-4823-B9EF-4421050F0847",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update19:*:*:*:*:*:*",
              "matchCriteriaId": "608B205D-0B79-4D1C-B2C1-64C31DB1896E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update2:*:*:*:*:*:*",
              "matchCriteriaId": "10B863B8-201D-494C-8175-168820996174",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update20:*:*:*:*:*:*",
              "matchCriteriaId": "4427DC78-E80C-4057-A295-B0731437A99E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update21:*:*:*:*:*:*",
              "matchCriteriaId": "22B6B8C1-1FF3-41BC-9576-16193AE20CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update22:*:*:*:*:*:*",
              "matchCriteriaId": "DDA17F24-1A7E-4BEB-9C98-41761A2A36A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update23:*:*:*:*:*:*",
              "matchCriteriaId": "3B062851-CE6B-44F4-8222-422EC9872EC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update24:*:*:*:*:*:*",
              "matchCriteriaId": "D4687FDA-0078-4E89-ADD8-7EDDA68261A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update25:*:*:*:*:*:*",
              "matchCriteriaId": "7EA29B09-CC24-4063-96A5-96AA08C0886D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update26:*:*:*:*:*:*",
              "matchCriteriaId": "331FC246-D3E9-4711-B305-BE51BF743CF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update27:*:*:*:*:*:*",
              "matchCriteriaId": "A5823BC0-8C11-4C31-9E99-3C9D82918E2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update28:*:*:*:*:*:*",
              "matchCriteriaId": "E2E6CB66-1AE1-4626-8070-64C250ED8363",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update29:*:*:*:*:*:*",
              "matchCriteriaId": "B63449AA-6831-4290-B1FA-0BB806820402",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update3:*:*:*:*:*:*",
              "matchCriteriaId": "CBF766CE-CBB8-472A-BAF0-BD39A7BCB4DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update30:*:*:*:*:*:*",
              "matchCriteriaId": "B3B169F6-B8B8-4612-AD7D-F75CC6A9297B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update31:*:*:*:*:*:*",
              "matchCriteriaId": "12D46756-D26D-4877-ACE8-1C2721908428",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update32:*:*:*:*:*:*",
              "matchCriteriaId": "5403DCEF-20C2-4568-8DF1-30804F522915",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update33:*:*:*:*:*:*",
              "matchCriteriaId": "90E39742-90BE-4DEB-AB78-F9B8F7333F9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update34:*:*:*:*:*:*",
              "matchCriteriaId": "9D07DB20-9DCF-4C05-99D2-F6B37A082C14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update35:*:*:*:*:*:*",
              "matchCriteriaId": "341D1157-8118-4BD3-A902-36E90E066706",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update36:*:*:*:*:*:*",
              "matchCriteriaId": "1AB71307-7EAA-436A-9CBC-5A94F034FB48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update37:*:*:*:*:*:*",
              "matchCriteriaId": "9446B3A5-6647-416C-92AF-7B6E0E929765",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update38:*:*:*:*:*:*",
              "matchCriteriaId": "06386C7A-CAA1-4FC4-9182-5A66342FB903",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update39:*:*:*:*:*:*",
              "matchCriteriaId": "8C84B701-B9A1-43D0-AF0C-30EDBD24CF90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update4:*:*:*:*:*:*",
              "matchCriteriaId": "182FAA46-D9FB-4170-B305-BAD0DF6E5DE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update40:*:*:*:*:*:*",
              "matchCriteriaId": "BA9AF651-D118-4437-B400-531B26BF6801",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update41:*:*:*:*:*:*",
              "matchCriteriaId": "2B256485-E289-4092-B45B-835DE12625B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update42:*:*:*:*:*:*",
              "matchCriteriaId": "119B54BD-75F4-46A4-A57D-16CFF4E12CEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update43:*:*:*:*:*:*",
              "matchCriteriaId": "A3382E2D-A414-40A1-A330-619859756A36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update44:*:*:*:*:*:*",
              "matchCriteriaId": "2E07B750-55B6-4DB6-B02B-216C2F5505A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update45:*:*:*:*:*:*",
              "matchCriteriaId": "B921E670-480F-4793-A636-3855A1654908",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update46:*:*:*:*:*:*",
              "matchCriteriaId": "62AE52FE-FB7F-4339-BDDE-E5AD235BBC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update47:*:*:*:*:*:*",
              "matchCriteriaId": "C99508DB-19E9-4832-AB38-57C61C7D68BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update48:*:*:*:*:*:*",
              "matchCriteriaId": "67F50AF8-7B0E-4D01-9EB2-C6625E9DACB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update49:*:*:*:*:*:*",
              "matchCriteriaId": "131E4E65-D997-47F1-8CB8-15CE6A60AB1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update5:*:*:*:*:*:*",
              "matchCriteriaId": "DF1BB9E6-D690-4C12-AEF0-4BD712869CBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*",
              "matchCriteriaId": "CCD1DEA0-8823-4780-B5EE-C1A2BB3C6B4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update51:*:*:*:*:*:*",
              "matchCriteriaId": "94AC684E-3C5F-4859-B6EB-42C478F9DD11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:*",
              "matchCriteriaId": "DC6FF5AB-B6E4-45D9-854B-29DEC200DA4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update53:*:*:*:*:*:*",
              "matchCriteriaId": "9855E3CB-925E-4623-A776-59422AB2FC6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update54:*:*:*:*:*:*",
              "matchCriteriaId": "01C3B7BE-1F9B-4EDA-990C-A4022CB85612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update55:*:*:*:*:*:*",
              "matchCriteriaId": "65CF766C-626D-4F8C-BDBF-F0C5404DD545",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update56:*:*:*:*:*:*",
              "matchCriteriaId": "720EF24C-9A36-405B-A380-6114C150B376",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update57:*:*:*:*:*:*",
              "matchCriteriaId": "44479EF5-40BD-43A2-AD0F-CE1660222AB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update58:*:*:*:*:*:*",
              "matchCriteriaId": "B8E0BD92-0F77-481E-8167-F81755E00703",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update59:*:*:*:*:*:*",
              "matchCriteriaId": "2BDB885E-814A-4CA8-A81C-1DB35989089B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update6:*:*:*:*:*:*",
              "matchCriteriaId": "653A0452-070F-4312-B94A-F5BCB01B9BDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update60:*:*:*:*:*:*",
              "matchCriteriaId": "B73DA1AE-C62F-4E62-AA98-5697656825F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update61:*:*:*:*:*:*",
              "matchCriteriaId": "D49DEE85-4DDB-4EF4-9F4D-11E7C1364055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update62:*:*:*:*:*:*",
              "matchCriteriaId": "365F28B6-DBF2-45BB-A06D-DD80CFBAD7BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update63:*:*:*:*:*:*",
              "matchCriteriaId": "5FDAD47C-C2DA-4533-AA58-DD6EC09A580A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update64:*:*:*:*:*:*",
              "matchCriteriaId": "5F81F36F-B20F-48B3-A1F2-3D319A34176B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update65:*:*:*:*:*:*",
              "matchCriteriaId": "754329CD-30B7-4410-A371-56A7C261B61B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update66:*:*:*:*:*:*",
              "matchCriteriaId": "C9445405-6B94-4DD1-BA94-B600AA316BB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update67:*:*:*:*:*:*",
              "matchCriteriaId": "960F3F22-9CC8-4655-9B09-777E5A5A1239",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update68:*:*:*:*:*:*",
              "matchCriteriaId": "D2B77C89-7F33-47A0-B6BF-473366033BEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update69:*:*:*:*:*:*",
              "matchCriteriaId": "8183B9D5-1C4D-4D30-BD85-13850FF34CB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update7:*:*:*:*:*:*",
              "matchCriteriaId": "15B67345-D0AF-4BFD-A62D-870F75306A4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update70:*:*:*:*:*:*",
              "matchCriteriaId": "1675366A-2388-4F7E-B423-D39BC7D3D38D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update71:*:*:*:*:*:*",
              "matchCriteriaId": "B93C3CF2-4F45-4F6C-AB6D-F9ABDA7C4DA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update72:*:*:*:*:*:*",
              "matchCriteriaId": "34A6A6A0-9307-4F5D-9605-1F786D1CD62A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update73:*:*:*:*:*:*",
              "matchCriteriaId": "6B994132-7103-4132-9D90-11CA264FEDE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update74:*:*:*:*:*:*",
              "matchCriteriaId": "A1958E04-AB8A-4B0E-AB45-B810CAED2EEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update75:*:*:*:*:*:*",
              "matchCriteriaId": "BB5558B0-6714-4B3A-B287-1943517A975A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update76:*:*:*:*:*:*",
              "matchCriteriaId": "7E325115-EEBC-41F4-8606-45270DA40B98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update77:*:*:*:*:*:*",
              "matchCriteriaId": "848B2C72-447D-46E2-A5A7-43CF3764E578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update78:*:*:*:*:*:*",
              "matchCriteriaId": "26A0AF15-52A9-46FD-8157-359141332EAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update79:*:*:*:*:*:*",
              "matchCriteriaId": "63D63872-C1D0-444F-BCC7-A514F323C256",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update8:*:*:*:*:*:*",
              "matchCriteriaId": "DE1F4262-A054-48CC-BF1D-AA77A94FFFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update80:*:*:*:*:*:*",
              "matchCriteriaId": "9D9FA9AD-39D3-412A-B794-E1B29EEEEC4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*",
              "matchCriteriaId": "294D8A56-A797-433C-A06E-106B2179151A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*",
              "matchCriteriaId": "824D88D9-4645-4CAD-8CAB-30F27DD388C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*",
              "matchCriteriaId": "F6E8C952-B455-46E4-AC3D-D38CAF189F60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*",
              "matchCriteriaId": "CD77C0EE-AC79-4443-A502-C1E02F806911",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*",
              "matchCriteriaId": "648EB53C-7A90-4DA6-BF1C-B5336CDE30C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update86:*:*:*:*:*:*",
              "matchCriteriaId": "39835EF7-8E93-4695-973D-6E9B76C67372",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update87:*:*:*:*:*:*",
              "matchCriteriaId": "2A05FB86-332B-44E3-93CB-82465A38976E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update88:*:*:*:*:*:*",
              "matchCriteriaId": "7C754823-899C-4EEF-ACB7-E1551FA88B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update89:*:*:*:*:*:*",
              "matchCriteriaId": "493D4C18-DEE2-4040-9C13-3A9AB2CE47BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update9:*:*:*:*:*:*",
              "matchCriteriaId": "D176CECA-2821-49EA-86EC-1184C133C0A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update90:*:*:*:*:*:*",
              "matchCriteriaId": "8F17DD75-E63B-4E4C-B136-D43F17B389EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update91:*:*:*:*:*:*",
              "matchCriteriaId": "62EE759A-78AD-40D6-8C5B-10403A8A4A89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update92:*:*:*:*:*:*",
              "matchCriteriaId": "865ABA1F-CA99-4602-B325-F81C9778855C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Reflected cross-site scripting (XSS) vulnerability on the add assignees to a role page in Liferay Portal 7.3.3 through 7.4.3.97, and Liferay DXP 2023.Q3 before patch 6, 7.4 GA through update 92, and 7.3 before update 34 allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_roles_admin_web_portlet_RolesAdminPortlet_tabs2 parameter."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de Cross-site scripting (XSS) reflejado al agregar asignados a una p\u00e1gina de rol en Liferay Portal 7.3.3 hasta 7.4.3.97 y Liferay DXP 2023.Q3 antes del parche 6, 7.4 GA hasta la actualizaci\u00f3n 92 y 7.3 antes de que la actualizaci\u00f3n 34 lo permita atacantes remotos inyectar script web o HTML arbitrario a trav\u00e9s del par\u00e1metro _com_liferay_roles_admin_web_portlet_RolesAdminPortlet_tabs2."
    }
  ],
  "id": "CVE-2023-42496",
  "lastModified": "2025-01-28T02:54:33.753",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.6,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 6.0,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-21T03:15:08.057",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-42496"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-42496"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-10-17 10:15
Modified
2024-11-21 08:25
Summary
Stored cross-site scripting (XSS) vulnerability in Page Tree menu Liferay Portal 7.3.6 through 7.4.3.78, and Liferay DXP 7.3 fix pack 1 through update 23, and 7.4 before update 79 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into page's "Name" text field.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "072F6C59-3D86-48D1-A14E-477FFFA3B1D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "FE68B4A2-3459-4DBA-8BAC-E9AA9FA25264",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "680D7963-1393-4E86-A65F-D4463D532120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "D81E73DD-FD21-4082-A883-34422AE6C024",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "E6DD0451-98EA-4140-8294-77A14F063E2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "CE94E76B-8CC2-4E91-B7A3-EEBCC1358FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "408BD438-E15C-422F-9612-C62A7387FC63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "A78C8B1C-39CB-4C27-B57C-0AF5E7EB50D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_17:*:*:*:*:*:*",
              "matchCriteriaId": "0AB19E97-BACE-4FCC-A53F-078D61A7A9E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_18:*:*:*:*:*:*",
              "matchCriteriaId": "D18ACD28-9182-435C-A30F-DF3BFE13C39A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_19:*:*:*:*:*:*",
              "matchCriteriaId": "CFE4CC72-C15A-40DE-AFF4-0B6B79BFB2BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "386F0E26-78DC-4D59-A20F-B41D0E59561B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_20:*:*:*:*:*:*",
              "matchCriteriaId": "43C11288-1C48-47A0-95DF-A48F3C0285F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_21:*:*:*:*:*:*",
              "matchCriteriaId": "5ECF3B18-D0DB-4FB6-9F6F-B63A6CE45081",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_22:*:*:*:*:*:*",
              "matchCriteriaId": "79AC7C0B-4135-4C24-8D37-A9431156E3E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_23:*:*:*:*:*:*",
              "matchCriteriaId": "7289F71D-ECEB-4FB9-A53F-D3F4D1315ADD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "54576481-2AE9-4133-9EFA-B7FBDCA4427D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "E29CE810-76D5-4283-B102-70344B6C9506",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "DA869467-C560-4130-A180-86819F6A8673",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "CC0C94B7-31FB-4115-8EDE-62CC459B6663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "07DEAA71-53DA-4508-B7E6-924ABED49E66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "467323F6-5CA7-42A0-9810-C6FA694CEC93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "32EFFD8A-1C0D-446B-AAD7-5D23D483D3D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
              "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update21:*:*:*:*:*:*",
              "matchCriteriaId": "22B6B8C1-1FF3-41BC-9576-16193AE20CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update34:*:*:*:*:*:*",
              "matchCriteriaId": "9D07DB20-9DCF-4C05-99D2-F6B37A082C14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update36:*:*:*:*:*:*",
              "matchCriteriaId": "1AB71307-7EAA-436A-9CBC-5A94F034FB48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update41:*:*:*:*:*:*",
              "matchCriteriaId": "2B256485-E289-4092-B45B-835DE12625B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update48:*:*:*:*:*:*",
              "matchCriteriaId": "67F50AF8-7B0E-4D01-9EB2-C6625E9DACB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*",
              "matchCriteriaId": "CCD1DEA0-8823-4780-B5EE-C1A2BB3C6B4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:*",
              "matchCriteriaId": "DC6FF5AB-B6E4-45D9-854B-29DEC200DA4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update62:*:*:*:*:*:*",
              "matchCriteriaId": "365F28B6-DBF2-45BB-A06D-DD80CFBAD7BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update67:*:*:*:*:*:*",
              "matchCriteriaId": "960F3F22-9CC8-4655-9B09-777E5A5A1239",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update76:*:*:*:*:*:*",
              "matchCriteriaId": "7E325115-EEBC-41F4-8606-45270DA40B98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CD5A1D3-7822-4D13-842D-18A7F04802A6",
              "versionEndExcluding": "7.4.3.49",
              "versionStartIncluding": "7.3.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stored cross-site scripting (XSS) vulnerability in Page Tree menu Liferay Portal 7.3.6 through 7.4.3.78, and Liferay DXP 7.3 fix pack 1 through update 23, and 7.4 before update 79 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into page\u0027s \"Name\" text field."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de Cross-Site Scripting (XSS) almacenada en Page Tree menu Liferay Portal 7.3.6 hasta 7.4.3.78, y Liferay DXP 7.3 fixpack 1 hasta la actualizaci\u00f3n 23, y 7.4 antes de la actualizaci\u00f3n 79 permite a atacantes remotos inyectar script web o HTML arbitrario mediante un payload manipulado inyectado en el campo de texto \"Name\" de la p\u00e1gina."
    }
  ],
  "id": "CVE-2023-44310",
  "lastModified": "2024-11-21T08:25:38.483",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.0,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 6.0,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-10-17T10:15:09.793",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-44310"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-44310"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-03-03 00:15
Modified
2024-11-21 06:16
Summary
Cross-site scripting (XSS) vulnerability in the Server module's script console in Liferay Portal 7.3.2 and earlier, and Liferay DXP 7.0 before fix pack 101, 7.1 before fix pack 20 and 7.2 before fix pack 10 allows remote attackers to inject arbitrary web script or HTML via the output of a script.
Impacted products
Vendor Product Version
liferay liferay_portal *
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1708EE59-0B7D-409A-A906-26276641AF3A",
              "versionEndIncluding": "7.3.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4614C87F-F39C-4ADD-A7A2-4A498612AD38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "6F20D93D-7FB2-4D5F-9249-4DECDE473C42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "CF0821E5-B6E5-44E6-9CF7-77EAE982F677",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_100:*:*:*:*:*:*",
              "matchCriteriaId": "8C9B7CF8-5553-47B6-BB57-0429D78AE301",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "1B24B6A1-8439-49D6-8E78-193144F3DCC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "7E82A6CC-891C-4619-84EA-0DA96E4043C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "70E12054-0DEE-4B92-B8F6-7DC4B2461113",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "3B566A51-3EFC-4A08-8A4F-A9AA43FBE481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "FE1A8781-6B16-4D37-B556-36B99CBCA9F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "3EE11B43-1629-4A22-BE88-0AFB2DFC528C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_17:*:*:*:*:*:*",
              "matchCriteriaId": "10FC6F33-C031-40A4-AFAF-B5CF30F79E52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_18:*:*:*:*:*:*",
              "matchCriteriaId": "99B99578-CACE-47D2-9C1E-A7BBD2B6F6EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_19:*:*:*:*:*:*",
              "matchCriteriaId": "950D98A8-88EE-4C99-817B-C418071B2819",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "F86FF50F-B21A-4B6E-88B8-90D0C042E942",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_20:*:*:*:*:*:*",
              "matchCriteriaId": "CE0E1891-6E76-4069-B412-43B5E5379E0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_21:*:*:*:*:*:*",
              "matchCriteriaId": "404F5FFE-2758-452F-9297-40E0533C6FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_22:*:*:*:*:*:*",
              "matchCriteriaId": "3F5B7E72-8D62-464A-AA82-CBE2625C7687",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_23:*:*:*:*:*:*",
              "matchCriteriaId": "4FA67C68-3E8E-4383-967F-A1FA55AE4897",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_24:*:*:*:*:*:*",
              "matchCriteriaId": "F220793A-FDAC-48C6-B299-39EB3BC077A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_25:*:*:*:*:*:*",
              "matchCriteriaId": "F095A9E1-5FE1-46C4-B0E1-97F8767439D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_26:*:*:*:*:*:*",
              "matchCriteriaId": "DFD748DD-6FDB-44CD-96BF-026D18CE4207",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_27:*:*:*:*:*:*",
              "matchCriteriaId": "0A34F2EA-D0F7-4C9B-BFE6-DA334DFD0EDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_28:*:*:*:*:*:*",
              "matchCriteriaId": "4B3C2426-7617-4535-B86A-7F9BA45DFD0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_29:*:*:*:*:*:*",
              "matchCriteriaId": "88A5CBCE-2BAE-44C7-A7BF-BC30C89839BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "CA6B2500-42E4-4F87-8B93-2F7399B4F611",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_30:*:*:*:*:*:*",
              "matchCriteriaId": "28955834-8E02-4558-ABD3-4958DBB41423",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_31:*:*:*:*:*:*",
              "matchCriteriaId": "89B4F926-5018-4C50-9569-A92BEA6364A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_32:*:*:*:*:*:*",
              "matchCriteriaId": "863C4DBB-9BA2-4A13-8394-08AC500D552A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_33:*:*:*:*:*:*",
              "matchCriteriaId": "C4206C84-C4BD-4363-A4CA-EE229CE06319",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_34:*:*:*:*:*:*",
              "matchCriteriaId": "54CA9915-54C2-4E7F-85AF-781CA0A63A9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_35:*:*:*:*:*:*",
              "matchCriteriaId": "4F644864-1056-4A0C-ADD7-A1992A0AC07D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_36:*:*:*:*:*:*",
              "matchCriteriaId": "91E9BAE9-CD40-4353-95DB-7D9ADC338F95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_37:*:*:*:*:*:*",
              "matchCriteriaId": "C2A29CA0-66CB-4ED9-87B3-57A1C04F59F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_38:*:*:*:*:*:*",
              "matchCriteriaId": "2BFC882E-25C2-46A3-A0DA-A779399A3A30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_39:*:*:*:*:*:*",
              "matchCriteriaId": "661E68A2-B365-4962-87CF-CE17A500889F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "D4094372-E950-4DE0-86D2-CE7F214FD3A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_40:*:*:*:*:*:*",
              "matchCriteriaId": "A5D28279-002A-4BC7-9396-E47FC842D7AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_41:*:*:*:*:*:*",
              "matchCriteriaId": "C700ED72-4626-48A0-B1BB-E0A7C12D454F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_42:*:*:*:*:*:*",
              "matchCriteriaId": "8F473DF1-F70D-4EDB-A011-C8D1C6A21659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_43:*:*:*:*:*:*",
              "matchCriteriaId": "C2351EAC-F6AD-4611-B9BD-39C4DFE85B5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_44:*:*:*:*:*:*",
              "matchCriteriaId": "357845C1-3834-465A-B9CA-F9C604AA8242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_45:*:*:*:*:*:*",
              "matchCriteriaId": "DD35964D-4156-45B8-A0AB-282DA9F4FA47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_46:*:*:*:*:*:*",
              "matchCriteriaId": "35656567-EF24-4948-A72A-C754D6E419B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_47:*:*:*:*:*:*",
              "matchCriteriaId": "E9A3D95D-4539-432D-B241-376F312534AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_48:*:*:*:*:*:*",
              "matchCriteriaId": "81F329F1-5BB1-42A7-98CE-B0EB5819D60A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_49:*:*:*:*:*:*",
              "matchCriteriaId": "5B7111FA-9FD7-4952-AFE1-07D3E14854F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "D35916F1-24AA-4BF3-8B1F-2361C5B815D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_50:*:*:*:*:*:*",
              "matchCriteriaId": "2C7A080F-9C99-41A0-BC63-EBDDC0DF7B8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_51:*:*:*:*:*:*",
              "matchCriteriaId": "0383C4C4-A7BB-418D-9A98-AC4233722961",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_52:*:*:*:*:*:*",
              "matchCriteriaId": "AA281A20-7599-446B-9587-118E920403D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_53:*:*:*:*:*:*",
              "matchCriteriaId": "9514E8F5-1D0B-4CDF-BD03-087326F6C252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_54:*:*:*:*:*:*",
              "matchCriteriaId": "78BC7D6C-2A10-4F78-9C41-EA97665C246E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_55:*:*:*:*:*:*",
              "matchCriteriaId": "B2C29B11-D87B-4D78-9D42-AD528C811080",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_56:*:*:*:*:*:*",
              "matchCriteriaId": "CA9BE427-78D7-4DEE-A174-F3E3675B44A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_57:*:*:*:*:*:*",
              "matchCriteriaId": "6C10325C-8670-499B-B003-7D8634539C5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_58:*:*:*:*:*:*",
              "matchCriteriaId": "5F692BEB-5CB1-41EA-B715-64AB0036F6CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_59:*:*:*:*:*:*",
              "matchCriteriaId": "427C4DF5-9039-4CB5-B600-5F965E20D945",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "EDEE4B40-889C-472E-AA91-7E1B4314EE64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_60:*:*:*:*:*:*",
              "matchCriteriaId": "44B7A2A2-5764-4EDB-AA44-25F8508CF128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_61:*:*:*:*:*:*",
              "matchCriteriaId": "55D94917-5360-4179-A017-1287C63A6E6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_62:*:*:*:*:*:*",
              "matchCriteriaId": "52C5C76D-2572-4ADF-B7E4-7B3444935658",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_63:*:*:*:*:*:*",
              "matchCriteriaId": "9ABFC91A-7A8D-4A08-9464-F534BAA69B4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_64:*:*:*:*:*:*",
              "matchCriteriaId": "1D378A23-113D-47AC-9CB5-2658C357FFB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_65:*:*:*:*:*:*",
              "matchCriteriaId": "58FB119E-508C-45F7-8AD8-B67AAAEA53D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_66:*:*:*:*:*:*",
              "matchCriteriaId": "8B3359A5-D39B-4322-8963-B138D791D232",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_67:*:*:*:*:*:*",
              "matchCriteriaId": "E11E2FBD-7541-4CE3-8A78-52FB82571547",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_68:*:*:*:*:*:*",
              "matchCriteriaId": "3883F470-8D8D-4CB3-BF4A-0C401BDABC83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_69:*:*:*:*:*:*",
              "matchCriteriaId": "1BDCF010-04BF-4FA5-9E14-F6461FED3FFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "3867FDAA-354E-4D2F-A260-27F31CA44C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_70:*:*:*:*:*:*",
              "matchCriteriaId": "7E8CEA39-4A7F-4827-91FA-31119201D174",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_71:*:*:*:*:*:*",
              "matchCriteriaId": "D3768AC9-A245-4B81-8D1D-9D9C5354245C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_72:*:*:*:*:*:*",
              "matchCriteriaId": "71CA65C9-C0FC-4CBD-A8B0-DD72604A46F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_73:*:*:*:*:*:*",
              "matchCriteriaId": "9F06DECA-F45D-49DA-BB24-AA1F0306B0B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_74:*:*:*:*:*:*",
              "matchCriteriaId": "3BA69ED9-28FA-40B5-84F9-0FFE40DFC675",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_75:*:*:*:*:*:*",
              "matchCriteriaId": "6FF2D31F-8719-41A6-ADD5-15BE9409428E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_76:*:*:*:*:*:*",
              "matchCriteriaId": "DE56F5E5-73CF-4636-9F98-86BDDA3F6A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_77:*:*:*:*:*:*",
              "matchCriteriaId": "CE4885B1-F912-4D06-8179-830FC011F3F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_78:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0EFCE-4B74-4B4D-AB6E-5730F26B38FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_79:*:*:*:*:*:*",
              "matchCriteriaId": "F02DCC86-C3F7-482C-9BFB-B7971FB10AEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "A89B7EE4-57FD-4B09-841A-ABC9990FF88F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_80:*:*:*:*:*:*",
              "matchCriteriaId": "06835B0A-A2DF-44D3-A38F-59E5D5523FFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_81:*:*:*:*:*:*",
              "matchCriteriaId": "B746D0CF-76F6-42A1-9056-CA9622DCD806",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_82:*:*:*:*:*:*",
              "matchCriteriaId": "FFC33A7E-B1CB-4E83-B75C-71F5E7E5E406",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_83:*:*:*:*:*:*",
              "matchCriteriaId": "325CFFCF-1609-4D89-B6A8-1C6ACBFDD35B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_84:*:*:*:*:*:*",
              "matchCriteriaId": "BD019A57-FC7A-4B1F-9946-FA15C90FC985",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_85:*:*:*:*:*:*",
              "matchCriteriaId": "A6B2CD3A-C39C-4F9A-8602-3EC75472181D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_86:*:*:*:*:*:*",
              "matchCriteriaId": "1B8DCD85-0E47-44C1-B7DD-E1B4756CEC17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_87:*:*:*:*:*:*",
              "matchCriteriaId": "1790D974-2EE0-4405-8F26-BB6DB3BDA23B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_88:*:*:*:*:*:*",
              "matchCriteriaId": "416B3F04-AD86-4F91-890E-56BA539AAB06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_89:*:*:*:*:*:*",
              "matchCriteriaId": "C12C0E4D-4E9A-4BD7-926E-74BCD42595B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "655A3A6A-A3EB-4864-B64D-2319E5CF7DA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_90:*:*:*:*:*:*",
              "matchCriteriaId": "9A659FEF-1BC1-45E8-A01E-1F9A8F2AFAAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_91:*:*:*:*:*:*",
              "matchCriteriaId": "3810319D-7DC4-47DD-B568-B0504DBC8209",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_92:*:*:*:*:*:*",
              "matchCriteriaId": "D9BFFFC0-912A-4F95-A08E-1D264135D1E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_93:*:*:*:*:*:*",
              "matchCriteriaId": "9EA924E7-DEF2-45BF-B435-C435AC20AF4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_94:*:*:*:*:*:*",
              "matchCriteriaId": "E6809C30-9A81-45E6-92E9-01D54880EFEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_95:*:*:*:*:*:*",
              "matchCriteriaId": "C194ACCD-CB7E-4DFC-ABB5-7CCEFD83E11B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_96:*:*:*:*:*:*",
              "matchCriteriaId": "69856C3C-2ACB-4718-821C-793118094985",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_97:*:*:*:*:*:*",
              "matchCriteriaId": "8693CC24-CEF6-4479-A3DA-8FD5C73E9548",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_98:*:*:*:*:*:*",
              "matchCriteriaId": "B1A95A94-83C6-4DCC-8208-B76B53678B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_99:*:*:*:*:*:*",
              "matchCriteriaId": "A1831C4F-7887-489E-91C1-3997114917DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "27DF695E-B890-42C2-8941-5BB53154755F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "072F6C59-3D86-48D1-A14E-477FFFA3B1D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "FE68B4A2-3459-4DBA-8BAC-E9AA9FA25264",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "680D7963-1393-4E86-A65F-D4463D532120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "D81E73DD-FD21-4082-A883-34422AE6C024",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "E6DD0451-98EA-4140-8294-77A14F063E2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "CE94E76B-8CC2-4E91-B7A3-EEBCC1358FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "408BD438-E15C-422F-9612-C62A7387FC63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "A78C8B1C-39CB-4C27-B57C-0AF5E7EB50D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_17:*:*:*:*:*:*",
              "matchCriteriaId": "0AB19E97-BACE-4FCC-A53F-078D61A7A9E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_18:*:*:*:*:*:*",
              "matchCriteriaId": "D18ACD28-9182-435C-A30F-DF3BFE13C39A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_19:*:*:*:*:*:*",
              "matchCriteriaId": "CFE4CC72-C15A-40DE-AFF4-0B6B79BFB2BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "386F0E26-78DC-4D59-A20F-B41D0E59561B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "54576481-2AE9-4133-9EFA-B7FBDCA4427D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "E29CE810-76D5-4283-B102-70344B6C9506",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "DA869467-C560-4130-A180-86819F6A8673",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "CC0C94B7-31FB-4115-8EDE-62CC459B6663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "07DEAA71-53DA-4508-B7E6-924ABED49E66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "467323F6-5CA7-42A0-9810-C6FA694CEC93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "32EFFD8A-1C0D-446B-AAD7-5D23D483D3D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the Server module\u0027s script console in Liferay Portal 7.3.2 and earlier, and Liferay DXP 7.0 before fix pack 101, 7.1 before fix pack 20 and 7.2 before fix pack 10 allows remote attackers to inject arbitrary web script or HTML via the output of a script."
    },
    {
      "lang": "es",
      "value": "La vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en la consola de secuencias de comandos del m\u00f3dulo Server en Liferay Portal 7.3.2 y anteriores, y Liferay DXP 7.0 antes del paquete de correcciones 101, 7.1 antes del paquete de correcciones 20 y 7.2 antes del paquete de correcciones 10 permite a los atacantes remotos inyectar secuencias de comandos web o HTML arbitrarias a trav\u00e9s de la salida de una secuencia de comandos"
    }
  ],
  "id": "CVE-2021-38263",
  "lastModified": "2024-11-21T06:16:41.793",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-03-03T00:15:07.933",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Product"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://issues.liferay.com/browse/LPE-17061"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38263-reflected-xss-with-script-page"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Product"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://issues.liferay.com/browse/LPE-17061"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38263-reflected-xss-with-script-page"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-05-24 14:15
Modified
2024-11-21 08:06
Summary
Cross-site scripting (XSS) vulnerability in the App Builder module's custom object details page in Liferay Portal 7.3.0 through 7.4.0, and Liferay DXP 7.3 before update 14 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into an App Builder custom object's `Name` field.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "324106E0-0AA8-42EB-80C7-21AC59ECDC57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "52877E3A-4E07-4B14-BABC-B70266FEFEDE",
              "versionEndIncluding": "7.4.0",
              "versionStartIncluding": "7.3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the App Builder module\u0027s custom object details page in Liferay Portal 7.3.0 through 7.4.0, and Liferay DXP 7.3 before update 14 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into an App Builder custom object\u0027s `Name` field."
    }
  ],
  "id": "CVE-2023-33938",
  "lastModified": "2024-11-21T08:06:14.583",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.7,
        "impactScore": 2.7,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-05-24T14:15:09.550",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33938"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33938"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-11-15 01:15
Modified
2024-11-21 07:24
Summary
The Friendly Url module in Liferay Portal 7.4.3.5 through 7.4.3.36, and Liferay DXP 7.4 update 1 though 36 does not properly check user permissions, which allows remote attackers to obtain the history of all friendly URLs that was assigned to a page.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
              "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update36:*:*:*:*:*:*",
              "matchCriteriaId": "1AB71307-7EAA-436A-9CBC-5A94F034FB48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE688932-9AFE-4F7C-9856-22E315265C1F",
              "versionEndExcluding": "7.4.3.37",
              "versionStartIncluding": "7.4.3.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Friendly Url module in Liferay Portal 7.4.3.5 through 7.4.3.36, and Liferay DXP 7.4 update 1 though 36 does not properly check user permissions, which allows remote attackers to obtain the history of all friendly URLs that was assigned to a page."
    },
    {
      "lang": "es",
      "value": "El m\u00f3dulo URL Amigables en Liferay Portal v7.4.3.5 a 7.4.3.36 y Liferay DXP 7.4 actualizaciones 1 a 36 no verifica adecuadamente los permisos de usuario, lo que permite a atacantes remotos obtener el historial de todas las URL amigables que se asignaron a una p\u00e1gina."
    }
  ],
  "id": "CVE-2022-42127",
  "lastModified": "2024-11-21T07:24:25.180",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-11-15T01:15:13.347",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://issues.liferay.com/browse/LPE-17607"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42127"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://issues.liferay.com/browse/LPE-17607"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42127"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-276"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-05-24 13:15
Modified
2024-11-21 08:06
Summary
Stored cross-site scripting (XSS) vulnerability in Form widget configuration in Liferay Portal 7.1.0 through 7.3.0, and Liferay DXP 7.1 before fix pack 18, and 7.2 before fix pack 5 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a form's `name` field.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "27DF695E-B890-42C2-8941-5BB53154755F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "072F6C59-3D86-48D1-A14E-477FFFA3B1D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "FE68B4A2-3459-4DBA-8BAC-E9AA9FA25264",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "680D7963-1393-4E86-A65F-D4463D532120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "D81E73DD-FD21-4082-A883-34422AE6C024",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "E6DD0451-98EA-4140-8294-77A14F063E2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "CE94E76B-8CC2-4E91-B7A3-EEBCC1358FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "408BD438-E15C-422F-9612-C62A7387FC63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "A78C8B1C-39CB-4C27-B57C-0AF5E7EB50D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_17:*:*:*:*:*:*",
              "matchCriteriaId": "0AB19E97-BACE-4FCC-A53F-078D61A7A9E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "386F0E26-78DC-4D59-A20F-B41D0E59561B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_20:*:*:*:*:*:*",
              "matchCriteriaId": "43C11288-1C48-47A0-95DF-A48F3C0285F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_21:*:*:*:*:*:*",
              "matchCriteriaId": "5ECF3B18-D0DB-4FB6-9F6F-B63A6CE45081",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_22:*:*:*:*:*:*",
              "matchCriteriaId": "79AC7C0B-4135-4C24-8D37-A9431156E3E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_23:*:*:*:*:*:*",
              "matchCriteriaId": "7289F71D-ECEB-4FB9-A53F-D3F4D1315ADD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_24:*:*:*:*:*:*",
              "matchCriteriaId": "C18AE68F-6EF0-4132-A3D8-C2D77A842137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_25:*:*:*:*:*:*",
              "matchCriteriaId": "4C5F0729-7B44-4B9E-949F-6A66D8176E11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_26:*:*:*:*:*:*",
              "matchCriteriaId": "B883C27E-3C14-4686-A0E8-8969B4246CDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "54576481-2AE9-4133-9EFA-B7FBDCA4427D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "E29CE810-76D5-4283-B102-70344B6C9506",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "DA869467-C560-4130-A180-86819F6A8673",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "CC0C94B7-31FB-4115-8EDE-62CC459B6663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "07DEAA71-53DA-4508-B7E6-924ABED49E66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "467323F6-5CA7-42A0-9810-C6FA694CEC93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "32EFFD8A-1C0D-446B-AAD7-5D23D483D3D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "99862578-46EC-4BB6-9CEF-EE5293BDCF8E",
              "versionEndExcluding": "7.3.1",
              "versionStartIncluding": "7.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stored cross-site scripting (XSS) vulnerability in Form widget configuration in Liferay Portal 7.1.0 through 7.3.0, and Liferay DXP 7.1 before fix pack 18, and 7.2 before fix pack 5 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a form\u0027s `name` field."
    }
  ],
  "id": "CVE-2023-33937",
  "lastModified": "2024-11-21T08:06:14.453",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-05-24T13:15:09.707",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33937"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33937"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-11-15 02:15
Modified
2024-11-21 07:24
Summary
The Test LDAP Users functionality in Liferay Portal 7.0.0 through 7.4.3.4, and Liferay DXP 7.0 fix pack 102 and earlier, 7.1 before fix pack 27, 7.2 before fix pack 17, 7.3 before update 4, and DXP 7.4 GA includes the LDAP credential in the page URL when paginating through the list of users, which allows man-in-the-middle attackers or attackers with access to the request logs to see the LDAP credential.
Impacted products
Vendor Product Version
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.0
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.4
liferay liferay_portal *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "4614C87F-F39C-4ADD-A7A2-4A498612AD38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "6F20D93D-7FB2-4D5F-9249-4DECDE473C42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "CF0821E5-B6E5-44E6-9CF7-77EAE982F677",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_100:*:*:*:*:*:*",
              "matchCriteriaId": "8C9B7CF8-5553-47B6-BB57-0429D78AE301",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "1B24B6A1-8439-49D6-8E78-193144F3DCC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "7E82A6CC-891C-4619-84EA-0DA96E4043C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "70E12054-0DEE-4B92-B8F6-7DC4B2461113",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "3B566A51-3EFC-4A08-8A4F-A9AA43FBE481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "FE1A8781-6B16-4D37-B556-36B99CBCA9F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "3EE11B43-1629-4A22-BE88-0AFB2DFC528C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_17:*:*:*:*:*:*",
              "matchCriteriaId": "10FC6F33-C031-40A4-AFAF-B5CF30F79E52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_18:*:*:*:*:*:*",
              "matchCriteriaId": "99B99578-CACE-47D2-9C1E-A7BBD2B6F6EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_19:*:*:*:*:*:*",
              "matchCriteriaId": "950D98A8-88EE-4C99-817B-C418071B2819",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "F86FF50F-B21A-4B6E-88B8-90D0C042E942",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_20:*:*:*:*:*:*",
              "matchCriteriaId": "CE0E1891-6E76-4069-B412-43B5E5379E0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_21:*:*:*:*:*:*",
              "matchCriteriaId": "404F5FFE-2758-452F-9297-40E0533C6FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_22:*:*:*:*:*:*",
              "matchCriteriaId": "3F5B7E72-8D62-464A-AA82-CBE2625C7687",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_23:*:*:*:*:*:*",
              "matchCriteriaId": "4FA67C68-3E8E-4383-967F-A1FA55AE4897",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_24:*:*:*:*:*:*",
              "matchCriteriaId": "F220793A-FDAC-48C6-B299-39EB3BC077A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_25:*:*:*:*:*:*",
              "matchCriteriaId": "F095A9E1-5FE1-46C4-B0E1-97F8767439D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_26:*:*:*:*:*:*",
              "matchCriteriaId": "DFD748DD-6FDB-44CD-96BF-026D18CE4207",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_27:*:*:*:*:*:*",
              "matchCriteriaId": "0A34F2EA-D0F7-4C9B-BFE6-DA334DFD0EDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_28:*:*:*:*:*:*",
              "matchCriteriaId": "4B3C2426-7617-4535-B86A-7F9BA45DFD0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_29:*:*:*:*:*:*",
              "matchCriteriaId": "88A5CBCE-2BAE-44C7-A7BF-BC30C89839BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "CA6B2500-42E4-4F87-8B93-2F7399B4F611",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_30:*:*:*:*:*:*",
              "matchCriteriaId": "28955834-8E02-4558-ABD3-4958DBB41423",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_31:*:*:*:*:*:*",
              "matchCriteriaId": "89B4F926-5018-4C50-9569-A92BEA6364A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_32:*:*:*:*:*:*",
              "matchCriteriaId": "863C4DBB-9BA2-4A13-8394-08AC500D552A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_33:*:*:*:*:*:*",
              "matchCriteriaId": "C4206C84-C4BD-4363-A4CA-EE229CE06319",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_34:*:*:*:*:*:*",
              "matchCriteriaId": "54CA9915-54C2-4E7F-85AF-781CA0A63A9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_35:*:*:*:*:*:*",
              "matchCriteriaId": "4F644864-1056-4A0C-ADD7-A1992A0AC07D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_36:*:*:*:*:*:*",
              "matchCriteriaId": "91E9BAE9-CD40-4353-95DB-7D9ADC338F95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_37:*:*:*:*:*:*",
              "matchCriteriaId": "C2A29CA0-66CB-4ED9-87B3-57A1C04F59F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_38:*:*:*:*:*:*",
              "matchCriteriaId": "2BFC882E-25C2-46A3-A0DA-A779399A3A30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_39:*:*:*:*:*:*",
              "matchCriteriaId": "661E68A2-B365-4962-87CF-CE17A500889F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "D4094372-E950-4DE0-86D2-CE7F214FD3A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_40:*:*:*:*:*:*",
              "matchCriteriaId": "A5D28279-002A-4BC7-9396-E47FC842D7AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_41:*:*:*:*:*:*",
              "matchCriteriaId": "C700ED72-4626-48A0-B1BB-E0A7C12D454F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_42:*:*:*:*:*:*",
              "matchCriteriaId": "8F473DF1-F70D-4EDB-A011-C8D1C6A21659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_43:*:*:*:*:*:*",
              "matchCriteriaId": "C2351EAC-F6AD-4611-B9BD-39C4DFE85B5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_44:*:*:*:*:*:*",
              "matchCriteriaId": "357845C1-3834-465A-B9CA-F9C604AA8242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_45:*:*:*:*:*:*",
              "matchCriteriaId": "DD35964D-4156-45B8-A0AB-282DA9F4FA47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_46:*:*:*:*:*:*",
              "matchCriteriaId": "35656567-EF24-4948-A72A-C754D6E419B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_47:*:*:*:*:*:*",
              "matchCriteriaId": "E9A3D95D-4539-432D-B241-376F312534AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_48:*:*:*:*:*:*",
              "matchCriteriaId": "81F329F1-5BB1-42A7-98CE-B0EB5819D60A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_49:*:*:*:*:*:*",
              "matchCriteriaId": "5B7111FA-9FD7-4952-AFE1-07D3E14854F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "D35916F1-24AA-4BF3-8B1F-2361C5B815D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_50:*:*:*:*:*:*",
              "matchCriteriaId": "2C7A080F-9C99-41A0-BC63-EBDDC0DF7B8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_51:*:*:*:*:*:*",
              "matchCriteriaId": "0383C4C4-A7BB-418D-9A98-AC4233722961",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_52:*:*:*:*:*:*",
              "matchCriteriaId": "AA281A20-7599-446B-9587-118E920403D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_53:*:*:*:*:*:*",
              "matchCriteriaId": "9514E8F5-1D0B-4CDF-BD03-087326F6C252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_54:*:*:*:*:*:*",
              "matchCriteriaId": "78BC7D6C-2A10-4F78-9C41-EA97665C246E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_55:*:*:*:*:*:*",
              "matchCriteriaId": "B2C29B11-D87B-4D78-9D42-AD528C811080",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_56:*:*:*:*:*:*",
              "matchCriteriaId": "CA9BE427-78D7-4DEE-A174-F3E3675B44A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_57:*:*:*:*:*:*",
              "matchCriteriaId": "6C10325C-8670-499B-B003-7D8634539C5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_58:*:*:*:*:*:*",
              "matchCriteriaId": "5F692BEB-5CB1-41EA-B715-64AB0036F6CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_59:*:*:*:*:*:*",
              "matchCriteriaId": "427C4DF5-9039-4CB5-B600-5F965E20D945",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "EDEE4B40-889C-472E-AA91-7E1B4314EE64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_60:*:*:*:*:*:*",
              "matchCriteriaId": "44B7A2A2-5764-4EDB-AA44-25F8508CF128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_61:*:*:*:*:*:*",
              "matchCriteriaId": "55D94917-5360-4179-A017-1287C63A6E6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_62:*:*:*:*:*:*",
              "matchCriteriaId": "52C5C76D-2572-4ADF-B7E4-7B3444935658",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_63:*:*:*:*:*:*",
              "matchCriteriaId": "9ABFC91A-7A8D-4A08-9464-F534BAA69B4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_64:*:*:*:*:*:*",
              "matchCriteriaId": "1D378A23-113D-47AC-9CB5-2658C357FFB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_65:*:*:*:*:*:*",
              "matchCriteriaId": "58FB119E-508C-45F7-8AD8-B67AAAEA53D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_66:*:*:*:*:*:*",
              "matchCriteriaId": "8B3359A5-D39B-4322-8963-B138D791D232",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_67:*:*:*:*:*:*",
              "matchCriteriaId": "E11E2FBD-7541-4CE3-8A78-52FB82571547",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_68:*:*:*:*:*:*",
              "matchCriteriaId": "3883F470-8D8D-4CB3-BF4A-0C401BDABC83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_69:*:*:*:*:*:*",
              "matchCriteriaId": "1BDCF010-04BF-4FA5-9E14-F6461FED3FFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "3867FDAA-354E-4D2F-A260-27F31CA44C8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_70:*:*:*:*:*:*",
              "matchCriteriaId": "7E8CEA39-4A7F-4827-91FA-31119201D174",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_71:*:*:*:*:*:*",
              "matchCriteriaId": "D3768AC9-A245-4B81-8D1D-9D9C5354245C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_72:*:*:*:*:*:*",
              "matchCriteriaId": "71CA65C9-C0FC-4CBD-A8B0-DD72604A46F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_73:*:*:*:*:*:*",
              "matchCriteriaId": "9F06DECA-F45D-49DA-BB24-AA1F0306B0B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_74:*:*:*:*:*:*",
              "matchCriteriaId": "3BA69ED9-28FA-40B5-84F9-0FFE40DFC675",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_75:*:*:*:*:*:*",
              "matchCriteriaId": "6FF2D31F-8719-41A6-ADD5-15BE9409428E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_76:*:*:*:*:*:*",
              "matchCriteriaId": "DE56F5E5-73CF-4636-9F98-86BDDA3F6A47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_77:*:*:*:*:*:*",
              "matchCriteriaId": "CE4885B1-F912-4D06-8179-830FC011F3F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_78:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0EFCE-4B74-4B4D-AB6E-5730F26B38FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_79:*:*:*:*:*:*",
              "matchCriteriaId": "F02DCC86-C3F7-482C-9BFB-B7971FB10AEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "A89B7EE4-57FD-4B09-841A-ABC9990FF88F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_80:*:*:*:*:*:*",
              "matchCriteriaId": "06835B0A-A2DF-44D3-A38F-59E5D5523FFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_81:*:*:*:*:*:*",
              "matchCriteriaId": "B746D0CF-76F6-42A1-9056-CA9622DCD806",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_82:*:*:*:*:*:*",
              "matchCriteriaId": "FFC33A7E-B1CB-4E83-B75C-71F5E7E5E406",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_83:*:*:*:*:*:*",
              "matchCriteriaId": "325CFFCF-1609-4D89-B6A8-1C6ACBFDD35B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_84:*:*:*:*:*:*",
              "matchCriteriaId": "BD019A57-FC7A-4B1F-9946-FA15C90FC985",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_85:*:*:*:*:*:*",
              "matchCriteriaId": "A6B2CD3A-C39C-4F9A-8602-3EC75472181D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_86:*:*:*:*:*:*",
              "matchCriteriaId": "1B8DCD85-0E47-44C1-B7DD-E1B4756CEC17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_87:*:*:*:*:*:*",
              "matchCriteriaId": "1790D974-2EE0-4405-8F26-BB6DB3BDA23B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_88:*:*:*:*:*:*",
              "matchCriteriaId": "416B3F04-AD86-4F91-890E-56BA539AAB06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_89:*:*:*:*:*:*",
              "matchCriteriaId": "C12C0E4D-4E9A-4BD7-926E-74BCD42595B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "655A3A6A-A3EB-4864-B64D-2319E5CF7DA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_90:*:*:*:*:*:*",
              "matchCriteriaId": "9A659FEF-1BC1-45E8-A01E-1F9A8F2AFAAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_91:*:*:*:*:*:*",
              "matchCriteriaId": "3810319D-7DC4-47DD-B568-B0504DBC8209",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_92:*:*:*:*:*:*",
              "matchCriteriaId": "D9BFFFC0-912A-4F95-A08E-1D264135D1E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_93:*:*:*:*:*:*",
              "matchCriteriaId": "9EA924E7-DEF2-45BF-B435-C435AC20AF4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_94:*:*:*:*:*:*",
              "matchCriteriaId": "E6809C30-9A81-45E6-92E9-01D54880EFEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_95:*:*:*:*:*:*",
              "matchCriteriaId": "C194ACCD-CB7E-4DFC-ABB5-7CCEFD83E11B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_96:*:*:*:*:*:*",
              "matchCriteriaId": "69856C3C-2ACB-4718-821C-793118094985",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_97:*:*:*:*:*:*",
              "matchCriteriaId": "8693CC24-CEF6-4479-A3DA-8FD5C73E9548",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_98:*:*:*:*:*:*",
              "matchCriteriaId": "B1A95A94-83C6-4DCC-8208-B76B53678B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.0:fix_pack_99:*:*:*:*:*:*",
              "matchCriteriaId": "A1831C4F-7887-489E-91C1-3997114917DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "27DF695E-B890-42C2-8941-5BB53154755F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "072F6C59-3D86-48D1-A14E-477FFFA3B1D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "FE68B4A2-3459-4DBA-8BAC-E9AA9FA25264",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "680D7963-1393-4E86-A65F-D4463D532120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "D81E73DD-FD21-4082-A883-34422AE6C024",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "E6DD0451-98EA-4140-8294-77A14F063E2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "CE94E76B-8CC2-4E91-B7A3-EEBCC1358FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "408BD438-E15C-422F-9612-C62A7387FC63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "A78C8B1C-39CB-4C27-B57C-0AF5E7EB50D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_17:*:*:*:*:*:*",
              "matchCriteriaId": "0AB19E97-BACE-4FCC-A53F-078D61A7A9E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_18:*:*:*:*:*:*",
              "matchCriteriaId": "D18ACD28-9182-435C-A30F-DF3BFE13C39A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_19:*:*:*:*:*:*",
              "matchCriteriaId": "CFE4CC72-C15A-40DE-AFF4-0B6B79BFB2BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "386F0E26-78DC-4D59-A20F-B41D0E59561B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_20:*:*:*:*:*:*",
              "matchCriteriaId": "43C11288-1C48-47A0-95DF-A48F3C0285F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_21:*:*:*:*:*:*",
              "matchCriteriaId": "5ECF3B18-D0DB-4FB6-9F6F-B63A6CE45081",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_22:*:*:*:*:*:*",
              "matchCriteriaId": "79AC7C0B-4135-4C24-8D37-A9431156E3E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_23:*:*:*:*:*:*",
              "matchCriteriaId": "7289F71D-ECEB-4FB9-A53F-D3F4D1315ADD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_24:*:*:*:*:*:*",
              "matchCriteriaId": "C18AE68F-6EF0-4132-A3D8-C2D77A842137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_25:*:*:*:*:*:*",
              "matchCriteriaId": "4C5F0729-7B44-4B9E-949F-6A66D8176E11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_26:*:*:*:*:*:*",
              "matchCriteriaId": "B883C27E-3C14-4686-A0E8-8969B4246CDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "54576481-2AE9-4133-9EFA-B7FBDCA4427D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "E29CE810-76D5-4283-B102-70344B6C9506",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "DA869467-C560-4130-A180-86819F6A8673",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "CC0C94B7-31FB-4115-8EDE-62CC459B6663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "07DEAA71-53DA-4508-B7E6-924ABED49E66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "467323F6-5CA7-42A0-9810-C6FA694CEC93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "32EFFD8A-1C0D-446B-AAD7-5D23D483D3D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "58CE2C64-BC5F-4281-AD98-B2C4B24A949C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "311EE92A-0EEF-4556-A52F-E6C9522FA2DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "49501C9E-D12A-45E0-92F3-8FD5FDC6D3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9B36899-E84E-498B-B99B-B6EB8F7ECE5C",
              "versionEndExcluding": "7.4.3.5",
              "versionStartIncluding": "7.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Test LDAP Users functionality in Liferay Portal 7.0.0 through 7.4.3.4, and Liferay DXP 7.0 fix pack 102 and earlier, 7.1 before fix pack 27, 7.2 before fix pack 17, 7.3 before update 4, and DXP 7.4 GA includes the LDAP credential in the page URL when paginating through the list of users, which allows man-in-the-middle attackers or attackers with access to the request logs to see the LDAP credential."
    },
    {
      "lang": "es",
      "value": "La funcionalidad Probar usuarios de LDAP en Liferay Portal 7.0.0 a 7.4.3.4, y Liferay DXP 7.0 fixpack 102 y anteriores, 7.1 antes del fixpack 27, 7.2 antes del fixpack 17, 7.3 antes de la actualizaci\u00f3n 4 y DXP 7.4 GA incluye LDAP credencial en la URL de la p\u00e1gina al paginar a trav\u00e9s de la lista de usuarios, lo que permite a los atacantes intermediarios o a los atacantes con acceso a los registros de solicitudes ver la credencial LDAP."
    }
  ],
  "id": "CVE-2022-42132",
  "lastModified": "2024-11-21T07:24:25.987",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-11-15T02:15:12.240",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://issues.liferay.com/browse/LPE-17438"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42132"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://issues.liferay.com/browse/LPE-17438"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42132"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-05-24 15:15
Modified
2024-11-21 08:06
Summary
Multiple cross-site scripting (XSS) vulnerabilities in the Plugin for OAuth 2.0 module's OAuth2ProviderApplicationRedirect class in Liferay Portal 7.4.3.41 through 7.4.3.52, and Liferay DXP 7.4 update 41 through 52 allow remote attackers to inject arbitrary web script or HTML via the (1) code, or (2) error parameter.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update41:*:*:*:*:*:*",
              "matchCriteriaId": "2B256485-E289-4092-B45B-835DE12625B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:*",
              "matchCriteriaId": "DC6FF5AB-B6E4-45D9-854B-29DEC200DA4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CE9EC98-8A74-4024-A1EA-8E1CF2F3E832",
              "versionEndIncluding": "7.4.3.52",
              "versionStartIncluding": "7.4.3.31",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple cross-site scripting (XSS) vulnerabilities in the Plugin for OAuth 2.0 module\u0027s OAuth2ProviderApplicationRedirect class in Liferay Portal 7.4.3.41 through 7.4.3.52, and Liferay DXP 7.4 update 41 through 52 allow remote attackers to inject arbitrary web script or HTML via the (1) code, or (2) error parameter."
    }
  ],
  "id": "CVE-2023-33941",
  "lastModified": "2024-11-21T08:06:15.363",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-05-24T15:15:09.697",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33941"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33941"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-05-24 16:15
Modified
2024-11-21 08:06
Summary
SQL injection vulnerability in the upgrade process for SQL Server in Liferay Portal 7.3.1 through 7.4.3.17, and Liferay DXP 7.3 before update 6, and 7.4 before update 18 allows attackers to execute arbitrary SQL commands via the name of a database table's primary key index. This vulnerability is only exploitable when chained with other attacks. To exploit this vulnerability, the attacker must modify the database and wait for the application to be upgraded.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
              "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4DFF5AC-510D-4930-A6C8-214A1320AA5C",
              "versionEndIncluding": "7.4.3.17",
              "versionStartIncluding": "7.3.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SQL injection vulnerability in the upgrade process for SQL Server in Liferay Portal 7.3.1 through 7.4.3.17, and Liferay DXP 7.3 before update 6, and 7.4 before update 18 allows attackers to execute arbitrary SQL commands via the name of a database table\u0027s primary key index. This vulnerability is only exploitable when chained with other attacks. To exploit this vulnerability, the attacker must modify the database and wait for the application to be upgraded."
    }
  ],
  "id": "CVE-2023-33945",
  "lastModified": "2024-11-21T08:06:15.860",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.5,
        "impactScore": 5.9,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-05-24T16:15:09.760",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33945"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33945"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-08-02 10:15
Modified
2024-11-21 08:17
Summary
The organization selector in Liferay Portal 7.4.3.81 through 7.4.3.85, and Liferay DXP 7.4 update 81 through 85 does not check user permission, which allows remote authenticated users to obtain a list of all organizations.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*",
              "matchCriteriaId": "294D8A56-A797-433C-A06E-106B2179151A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*",
              "matchCriteriaId": "824D88D9-4645-4CAD-8CAB-30F27DD388C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*",
              "matchCriteriaId": "F6E8C952-B455-46E4-AC3D-D38CAF189F60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*",
              "matchCriteriaId": "CD77C0EE-AC79-4443-A502-C1E02F806911",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*",
              "matchCriteriaId": "648EB53C-7A90-4DA6-BF1C-B5336CDE30C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "43BF2B31-48F4-4E42-BB8E-CAA891964ED5",
              "versionEndIncluding": "7.4.3.85",
              "versionStartIncluding": "7.4.3.81",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The organization selector in Liferay Portal 7.4.3.81 through 7.4.3.85, and Liferay DXP 7.4 update 81 through 85 does not check user permission, which allows remote authenticated users to obtain a list of all organizations."
    },
    {
      "lang": "es",
      "value": "El selector de organizaciones en Liferay Portal v7.4.3.81 a v7.4.3.85 y Liferay DXP v7.4 actualizaci\u00f3n 81 a 85 no comprueba el permiso del usuario, lo que permite a usuarios remotos autenticados obtener una lista de todas las organizaciones. "
    }
  ],
  "id": "CVE-2023-3426",
  "lastModified": "2024-11-21T08:17:14.497",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-08-02T10:15:09.887",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Patch",
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-3426"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-3426"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-425"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-862"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-21 14:15
Modified
2025-01-28 21:17
Summary
Stored cross-site scripting (XSS) vulnerability in the Document and Media widget in Liferay Portal 7.4.3.18 through 7.4.3.101, and Liferay DXP 2023.Q3 before patch 6, and 7.4 update 18 through 92 allows remote authenticated users to inject arbitrary web script or HTML via a crafted payload injected into a document's “Title” text field.
Impacted products
Vendor Product Version
liferay liferay_portal *
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 2023.q3.0
liferay digital_experience_platform 2023.q3.1
liferay digital_experience_platform 2023.q3.2
liferay digital_experience_platform 2023.q3.3
liferay digital_experience_platform 2023.q3.4
liferay digital_experience_platform 2023.q3.5



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9937F532-8A20-4311-A90A-A341DE318518",
              "versionEndExcluding": "7.4.3.102",
              "versionStartIncluding": "7.4.3.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update18:*:*:*:*:*:*",
              "matchCriteriaId": "D1A442EE-460F-4823-B9EF-4421050F0847",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update19:*:*:*:*:*:*",
              "matchCriteriaId": "608B205D-0B79-4D1C-B2C1-64C31DB1896E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update20:*:*:*:*:*:*",
              "matchCriteriaId": "4427DC78-E80C-4057-A295-B0731437A99E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update21:*:*:*:*:*:*",
              "matchCriteriaId": "22B6B8C1-1FF3-41BC-9576-16193AE20CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update22:*:*:*:*:*:*",
              "matchCriteriaId": "DDA17F24-1A7E-4BEB-9C98-41761A2A36A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update23:*:*:*:*:*:*",
              "matchCriteriaId": "3B062851-CE6B-44F4-8222-422EC9872EC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update24:*:*:*:*:*:*",
              "matchCriteriaId": "D4687FDA-0078-4E89-ADD8-7EDDA68261A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update25:*:*:*:*:*:*",
              "matchCriteriaId": "7EA29B09-CC24-4063-96A5-96AA08C0886D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update26:*:*:*:*:*:*",
              "matchCriteriaId": "331FC246-D3E9-4711-B305-BE51BF743CF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update27:*:*:*:*:*:*",
              "matchCriteriaId": "A5823BC0-8C11-4C31-9E99-3C9D82918E2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update28:*:*:*:*:*:*",
              "matchCriteriaId": "E2E6CB66-1AE1-4626-8070-64C250ED8363",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update29:*:*:*:*:*:*",
              "matchCriteriaId": "B63449AA-6831-4290-B1FA-0BB806820402",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update30:*:*:*:*:*:*",
              "matchCriteriaId": "B3B169F6-B8B8-4612-AD7D-F75CC6A9297B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update31:*:*:*:*:*:*",
              "matchCriteriaId": "12D46756-D26D-4877-ACE8-1C2721908428",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update32:*:*:*:*:*:*",
              "matchCriteriaId": "5403DCEF-20C2-4568-8DF1-30804F522915",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update33:*:*:*:*:*:*",
              "matchCriteriaId": "90E39742-90BE-4DEB-AB78-F9B8F7333F9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update34:*:*:*:*:*:*",
              "matchCriteriaId": "9D07DB20-9DCF-4C05-99D2-F6B37A082C14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update35:*:*:*:*:*:*",
              "matchCriteriaId": "341D1157-8118-4BD3-A902-36E90E066706",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update36:*:*:*:*:*:*",
              "matchCriteriaId": "1AB71307-7EAA-436A-9CBC-5A94F034FB48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update37:*:*:*:*:*:*",
              "matchCriteriaId": "9446B3A5-6647-416C-92AF-7B6E0E929765",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update38:*:*:*:*:*:*",
              "matchCriteriaId": "06386C7A-CAA1-4FC4-9182-5A66342FB903",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update39:*:*:*:*:*:*",
              "matchCriteriaId": "8C84B701-B9A1-43D0-AF0C-30EDBD24CF90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update40:*:*:*:*:*:*",
              "matchCriteriaId": "BA9AF651-D118-4437-B400-531B26BF6801",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update41:*:*:*:*:*:*",
              "matchCriteriaId": "2B256485-E289-4092-B45B-835DE12625B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update42:*:*:*:*:*:*",
              "matchCriteriaId": "119B54BD-75F4-46A4-A57D-16CFF4E12CEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update43:*:*:*:*:*:*",
              "matchCriteriaId": "A3382E2D-A414-40A1-A330-619859756A36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update44:*:*:*:*:*:*",
              "matchCriteriaId": "2E07B750-55B6-4DB6-B02B-216C2F5505A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update45:*:*:*:*:*:*",
              "matchCriteriaId": "B921E670-480F-4793-A636-3855A1654908",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update46:*:*:*:*:*:*",
              "matchCriteriaId": "62AE52FE-FB7F-4339-BDDE-E5AD235BBC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update47:*:*:*:*:*:*",
              "matchCriteriaId": "C99508DB-19E9-4832-AB38-57C61C7D68BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update48:*:*:*:*:*:*",
              "matchCriteriaId": "67F50AF8-7B0E-4D01-9EB2-C6625E9DACB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update49:*:*:*:*:*:*",
              "matchCriteriaId": "131E4E65-D997-47F1-8CB8-15CE6A60AB1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*",
              "matchCriteriaId": "CCD1DEA0-8823-4780-B5EE-C1A2BB3C6B4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update51:*:*:*:*:*:*",
              "matchCriteriaId": "94AC684E-3C5F-4859-B6EB-42C478F9DD11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:*",
              "matchCriteriaId": "DC6FF5AB-B6E4-45D9-854B-29DEC200DA4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update53:*:*:*:*:*:*",
              "matchCriteriaId": "9855E3CB-925E-4623-A776-59422AB2FC6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update54:*:*:*:*:*:*",
              "matchCriteriaId": "01C3B7BE-1F9B-4EDA-990C-A4022CB85612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update55:*:*:*:*:*:*",
              "matchCriteriaId": "65CF766C-626D-4F8C-BDBF-F0C5404DD545",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update56:*:*:*:*:*:*",
              "matchCriteriaId": "720EF24C-9A36-405B-A380-6114C150B376",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update57:*:*:*:*:*:*",
              "matchCriteriaId": "44479EF5-40BD-43A2-AD0F-CE1660222AB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update58:*:*:*:*:*:*",
              "matchCriteriaId": "B8E0BD92-0F77-481E-8167-F81755E00703",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update59:*:*:*:*:*:*",
              "matchCriteriaId": "2BDB885E-814A-4CA8-A81C-1DB35989089B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update60:*:*:*:*:*:*",
              "matchCriteriaId": "B73DA1AE-C62F-4E62-AA98-5697656825F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update61:*:*:*:*:*:*",
              "matchCriteriaId": "D49DEE85-4DDB-4EF4-9F4D-11E7C1364055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update62:*:*:*:*:*:*",
              "matchCriteriaId": "365F28B6-DBF2-45BB-A06D-DD80CFBAD7BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update63:*:*:*:*:*:*",
              "matchCriteriaId": "5FDAD47C-C2DA-4533-AA58-DD6EC09A580A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update64:*:*:*:*:*:*",
              "matchCriteriaId": "5F81F36F-B20F-48B3-A1F2-3D319A34176B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update65:*:*:*:*:*:*",
              "matchCriteriaId": "754329CD-30B7-4410-A371-56A7C261B61B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update66:*:*:*:*:*:*",
              "matchCriteriaId": "C9445405-6B94-4DD1-BA94-B600AA316BB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update67:*:*:*:*:*:*",
              "matchCriteriaId": "960F3F22-9CC8-4655-9B09-777E5A5A1239",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update68:*:*:*:*:*:*",
              "matchCriteriaId": "D2B77C89-7F33-47A0-B6BF-473366033BEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update69:*:*:*:*:*:*",
              "matchCriteriaId": "8183B9D5-1C4D-4D30-BD85-13850FF34CB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update70:*:*:*:*:*:*",
              "matchCriteriaId": "1675366A-2388-4F7E-B423-D39BC7D3D38D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update71:*:*:*:*:*:*",
              "matchCriteriaId": "B93C3CF2-4F45-4F6C-AB6D-F9ABDA7C4DA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update72:*:*:*:*:*:*",
              "matchCriteriaId": "34A6A6A0-9307-4F5D-9605-1F786D1CD62A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update73:*:*:*:*:*:*",
              "matchCriteriaId": "6B994132-7103-4132-9D90-11CA264FEDE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update74:*:*:*:*:*:*",
              "matchCriteriaId": "A1958E04-AB8A-4B0E-AB45-B810CAED2EEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update75:*:*:*:*:*:*",
              "matchCriteriaId": "BB5558B0-6714-4B3A-B287-1943517A975A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update76:*:*:*:*:*:*",
              "matchCriteriaId": "7E325115-EEBC-41F4-8606-45270DA40B98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update77:*:*:*:*:*:*",
              "matchCriteriaId": "848B2C72-447D-46E2-A5A7-43CF3764E578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update78:*:*:*:*:*:*",
              "matchCriteriaId": "26A0AF15-52A9-46FD-8157-359141332EAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update79:*:*:*:*:*:*",
              "matchCriteriaId": "63D63872-C1D0-444F-BCC7-A514F323C256",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update80:*:*:*:*:*:*",
              "matchCriteriaId": "9D9FA9AD-39D3-412A-B794-E1B29EEEEC4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*",
              "matchCriteriaId": "294D8A56-A797-433C-A06E-106B2179151A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*",
              "matchCriteriaId": "824D88D9-4645-4CAD-8CAB-30F27DD388C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*",
              "matchCriteriaId": "F6E8C952-B455-46E4-AC3D-D38CAF189F60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*",
              "matchCriteriaId": "CD77C0EE-AC79-4443-A502-C1E02F806911",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*",
              "matchCriteriaId": "648EB53C-7A90-4DA6-BF1C-B5336CDE30C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update86:*:*:*:*:*:*",
              "matchCriteriaId": "39835EF7-8E93-4695-973D-6E9B76C67372",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update87:*:*:*:*:*:*",
              "matchCriteriaId": "2A05FB86-332B-44E3-93CB-82465A38976E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update88:*:*:*:*:*:*",
              "matchCriteriaId": "7C754823-899C-4EEF-ACB7-E1551FA88B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update89:*:*:*:*:*:*",
              "matchCriteriaId": "493D4C18-DEE2-4040-9C13-3A9AB2CE47BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update90:*:*:*:*:*:*",
              "matchCriteriaId": "8F17DD75-E63B-4E4C-B136-D43F17B389EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update91:*:*:*:*:*:*",
              "matchCriteriaId": "62EE759A-78AD-40D6-8C5B-10403A8A4A89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update92:*:*:*:*:*:*",
              "matchCriteriaId": "865ABA1F-CA99-4602-B325-F81C9778855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7B3A5E2-23CE-45A8-BD01-77024EB9F9A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF6451A-2A5D-4222-A1C6-113AA4B8D4E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D6CE430-3C95-4855-BA44-E2E136D1FEB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "44FEB149-C792-493D-B055-568FFC96298A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B050DD73-71B6-46CD-A35B-7ACB53BE6C6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:2023.q3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "62432289-E1DC-4013-85C7-6B77299A910F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stored cross-site scripting (XSS) vulnerability in the Document and Media widget in Liferay Portal 7.4.3.18 through 7.4.3.101, and Liferay DXP 2023.Q3 before patch 6, and 7.4 update 18 through 92 allows remote authenticated users to inject arbitrary web script or HTML via a crafted payload injected into a document\u0027s \u201cTitle\u201d text field."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de Cross-Site Scripting (XSS) Almacenado en el widget Documentos y Medios en Liferay Portal 7.4.3.18 a 7.4.3.101, y Liferay DXP 2023.Q3 antes del parche 6, y 7.4 actualizaciones 18 a 92 permite a usuarios remotos autenticados inyectar script web o HTML arbitrario a trav\u00e9s de un payload manipulado inyectado en el campo de texto \"T\u00edtulo\" de un documento."
    }
  ],
  "id": "CVE-2023-47795",
  "lastModified": "2025-01-28T21:17:39.030",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.0,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 6.0,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-21T14:15:45.677",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-47795"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-47795"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-10-22 15:15
Modified
2024-12-10 21:06
Summary
The workflow component in Liferay Portal 7.3.2 through 7.4.3.111, and Liferay DXP 2023.Q4.0 through 2023.Q4.5, 2023.Q3.1 through 2023.Q3.8, 7.4 GA through update 92 and 7.3 GA through update 36 does not properly check user permissions before updating a workflow definition, which allows remote authenticated users to modify workflow definitions and execute arbitrary code (RCE) via the headless API.
Impacted products
Vendor Product Version
liferay digital_experience_platform *
liferay digital_experience_platform *
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay liferay_portal *
liferay liferay_portal *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3ED7CF1-6D8A-40F7-A009-F3A800F955BD",
              "versionEndExcluding": "2023.q3.9",
              "versionStartIncluding": "2023.q3.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C41E249-91C4-4B2D-A8D2-C953A463E14F",
              "versionEndExcluding": "2023.q4.6",
              "versionStartIncluding": "2023.q4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "728DF154-F19F-454C-87CA-1E755107F2A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update10:*:*:*:*:*:*",
              "matchCriteriaId": "AA984F92-4C6C-4049-A731-96F587B51E75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update11:*:*:*:*:*:*",
              "matchCriteriaId": "CADDF499-DDC4-4CEE-B512-404EA2024FCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update12:*:*:*:*:*:*",
              "matchCriteriaId": "9EC64246-1039-4009-B9BD-7828FA0FA1C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update13:*:*:*:*:*:*",
              "matchCriteriaId": "D9F352AE-AE22-4A84-94B6-6621D7E0BC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update14:*:*:*:*:*:*",
              "matchCriteriaId": "3E84D881-6D47-48FD-B743-9D531F5F7D5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update15:*:*:*:*:*:*",
              "matchCriteriaId": "1F8A9DEC-2C27-4EBB-B684-8EBDB374CFCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update16:*:*:*:*:*:*",
              "matchCriteriaId": "C3E7B777-8026-4C8F-9353-B5504873E0F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update17:*:*:*:*:*:*",
              "matchCriteriaId": "2207FEE5-2537-4C6E-AC9C-EC53DBF3C57E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update18:*:*:*:*:*:*",
              "matchCriteriaId": "087A2B43-07CE-4B3D-B879-449631DDA8D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update19:*:*:*:*:*:*",
              "matchCriteriaId": "019CED83-6277-434C-839C-6C4E0C45FB1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update20:*:*:*:*:*:*",
              "matchCriteriaId": "6C533124-74E6-4312-9AF7-6496DE2A5152",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update21:*:*:*:*:*:*",
              "matchCriteriaId": "8DDA248D-5F00-4FC1-B857-A7942BAA1F3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update22:*:*:*:*:*:*",
              "matchCriteriaId": "6C6BA174-69D4-43FC-9395-1B6306A44CDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update23:*:*:*:*:*:*",
              "matchCriteriaId": "A465C229-D3FB-43E9-87BE-119BEE9110F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update24:*:*:*:*:*:*",
              "matchCriteriaId": "32E98546-CE96-4BB8-A11C-F7E850C155F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update25:*:*:*:*:*:*",
              "matchCriteriaId": "DD43C626-F2F2-43BA-85AA-6ADAE8A6D11F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update26:*:*:*:*:*:*",
              "matchCriteriaId": "5C72C0E0-7D0B-4E8F-A109-7BB5DCA1C8D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update27:*:*:*:*:*:*",
              "matchCriteriaId": "7E796B04-FF54-4C02-979C-87E137A76F63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update28:*:*:*:*:*:*",
              "matchCriteriaId": "07C3D771-5E1B-46C4-AAF8-F425377582D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update29:*:*:*:*:*:*",
              "matchCriteriaId": "B08F95DC-BE49-4717-B959-2BE8BD131953",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update30:*:*:*:*:*:*",
              "matchCriteriaId": "E915FBC2-9BF7-4A99-B201-1F176D743494",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update31:*:*:*:*:*:*",
              "matchCriteriaId": "E44E02C2-6F83-4525-BF9D-E82CE9A9880E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update32:*:*:*:*:*:*",
              "matchCriteriaId": "660F37C6-61E6-4C34-8A7E-99C7DBEB8319",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update33:*:*:*:*:*:*",
              "matchCriteriaId": "5AD8D0D3-31AC-41E5-A780-5D5B18BF6991",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update34:*:*:*:*:*:*",
              "matchCriteriaId": "02D4C998-77F5-4428-A7B9-F7D909E23E92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update35:*:*:*:*:*:*",
              "matchCriteriaId": "C6984AC8-461D-488F-A911-7BF1D12B44A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update36:*:*:*:*:*:*",
              "matchCriteriaId": "E7FBF515-C800-41F3-9A0E-E850BE09FA93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update4:*:*:*:*:*:*",
              "matchCriteriaId": "AD408C73-7D78-4EB1-AA2C-F4A6D4DC980B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update5:*:*:*:*:*:*",
              "matchCriteriaId": "513F3229-7C31-44EB-88F6-E564BE725853",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update6:*:*:*:*:*:*",
              "matchCriteriaId": "76B9CD05-A10E-439C-9FDE-EA88EC3AF2C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update7:*:*:*:*:*:*",
              "matchCriteriaId": "A7D2D415-36AA-41B2-8FD9-21A98CDFE1EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update8:*:*:*:*:*:*",
              "matchCriteriaId": "124F2D2E-F8E7-4EDE-A98B-DD72FB43DF20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update9:*:*:*:*:*:*",
              "matchCriteriaId": "0DEE5985-289E-4138-B7C0-1E471BA7A1FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
              "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update10:*:*:*:*:*:*",
              "matchCriteriaId": "C7B02106-D5EA-4A59-A959-CCE2AC8F55BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update11:*:*:*:*:*:*",
              "matchCriteriaId": "80204464-5DC5-4A52-B844-C833A96E6BD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update12:*:*:*:*:*:*",
              "matchCriteriaId": "6F8A5D02-0B45-4DA9-ACD8-42C1BFF62827",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update13:*:*:*:*:*:*",
              "matchCriteriaId": "38DA7C99-AC2C-4B9A-B611-4697159E1D79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update14:*:*:*:*:*:*",
              "matchCriteriaId": "F264AD07-D105-4F00-8920-6D8146E4FA63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update15:*:*:*:*:*:*",
              "matchCriteriaId": "C929CF16-4725-492A-872B-0928FE388FC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update16:*:*:*:*:*:*",
              "matchCriteriaId": "1B8750A1-E481-48D4-84F4-97D1ABE15B46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update17:*:*:*:*:*:*",
              "matchCriteriaId": "454F8410-D9AC-481E-841C-60F0DF2CC25E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update18:*:*:*:*:*:*",
              "matchCriteriaId": "D1A442EE-460F-4823-B9EF-4421050F0847",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update19:*:*:*:*:*:*",
              "matchCriteriaId": "608B205D-0B79-4D1C-B2C1-64C31DB1896E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update2:*:*:*:*:*:*",
              "matchCriteriaId": "10B863B8-201D-494C-8175-168820996174",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update20:*:*:*:*:*:*",
              "matchCriteriaId": "4427DC78-E80C-4057-A295-B0731437A99E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update21:*:*:*:*:*:*",
              "matchCriteriaId": "22B6B8C1-1FF3-41BC-9576-16193AE20CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update22:*:*:*:*:*:*",
              "matchCriteriaId": "DDA17F24-1A7E-4BEB-9C98-41761A2A36A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update23:*:*:*:*:*:*",
              "matchCriteriaId": "3B062851-CE6B-44F4-8222-422EC9872EC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update24:*:*:*:*:*:*",
              "matchCriteriaId": "D4687FDA-0078-4E89-ADD8-7EDDA68261A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update25:*:*:*:*:*:*",
              "matchCriteriaId": "7EA29B09-CC24-4063-96A5-96AA08C0886D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update26:*:*:*:*:*:*",
              "matchCriteriaId": "331FC246-D3E9-4711-B305-BE51BF743CF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update27:*:*:*:*:*:*",
              "matchCriteriaId": "A5823BC0-8C11-4C31-9E99-3C9D82918E2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update28:*:*:*:*:*:*",
              "matchCriteriaId": "E2E6CB66-1AE1-4626-8070-64C250ED8363",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update29:*:*:*:*:*:*",
              "matchCriteriaId": "B63449AA-6831-4290-B1FA-0BB806820402",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update3:*:*:*:*:*:*",
              "matchCriteriaId": "CBF766CE-CBB8-472A-BAF0-BD39A7BCB4DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update30:*:*:*:*:*:*",
              "matchCriteriaId": "B3B169F6-B8B8-4612-AD7D-F75CC6A9297B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update31:*:*:*:*:*:*",
              "matchCriteriaId": "12D46756-D26D-4877-ACE8-1C2721908428",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update32:*:*:*:*:*:*",
              "matchCriteriaId": "5403DCEF-20C2-4568-8DF1-30804F522915",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update33:*:*:*:*:*:*",
              "matchCriteriaId": "90E39742-90BE-4DEB-AB78-F9B8F7333F9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update34:*:*:*:*:*:*",
              "matchCriteriaId": "9D07DB20-9DCF-4C05-99D2-F6B37A082C14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update35:*:*:*:*:*:*",
              "matchCriteriaId": "341D1157-8118-4BD3-A902-36E90E066706",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update36:*:*:*:*:*:*",
              "matchCriteriaId": "1AB71307-7EAA-436A-9CBC-5A94F034FB48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update37:*:*:*:*:*:*",
              "matchCriteriaId": "9446B3A5-6647-416C-92AF-7B6E0E929765",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update38:*:*:*:*:*:*",
              "matchCriteriaId": "06386C7A-CAA1-4FC4-9182-5A66342FB903",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update39:*:*:*:*:*:*",
              "matchCriteriaId": "8C84B701-B9A1-43D0-AF0C-30EDBD24CF90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update4:*:*:*:*:*:*",
              "matchCriteriaId": "182FAA46-D9FB-4170-B305-BAD0DF6E5DE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update40:*:*:*:*:*:*",
              "matchCriteriaId": "BA9AF651-D118-4437-B400-531B26BF6801",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update41:*:*:*:*:*:*",
              "matchCriteriaId": "2B256485-E289-4092-B45B-835DE12625B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update42:*:*:*:*:*:*",
              "matchCriteriaId": "119B54BD-75F4-46A4-A57D-16CFF4E12CEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update43:*:*:*:*:*:*",
              "matchCriteriaId": "A3382E2D-A414-40A1-A330-619859756A36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update44:*:*:*:*:*:*",
              "matchCriteriaId": "2E07B750-55B6-4DB6-B02B-216C2F5505A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update45:*:*:*:*:*:*",
              "matchCriteriaId": "B921E670-480F-4793-A636-3855A1654908",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update46:*:*:*:*:*:*",
              "matchCriteriaId": "62AE52FE-FB7F-4339-BDDE-E5AD235BBC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update47:*:*:*:*:*:*",
              "matchCriteriaId": "C99508DB-19E9-4832-AB38-57C61C7D68BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update48:*:*:*:*:*:*",
              "matchCriteriaId": "67F50AF8-7B0E-4D01-9EB2-C6625E9DACB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update49:*:*:*:*:*:*",
              "matchCriteriaId": "131E4E65-D997-47F1-8CB8-15CE6A60AB1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update5:*:*:*:*:*:*",
              "matchCriteriaId": "DF1BB9E6-D690-4C12-AEF0-4BD712869CBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*",
              "matchCriteriaId": "CCD1DEA0-8823-4780-B5EE-C1A2BB3C6B4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update51:*:*:*:*:*:*",
              "matchCriteriaId": "94AC684E-3C5F-4859-B6EB-42C478F9DD11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:*",
              "matchCriteriaId": "DC6FF5AB-B6E4-45D9-854B-29DEC200DA4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update53:*:*:*:*:*:*",
              "matchCriteriaId": "9855E3CB-925E-4623-A776-59422AB2FC6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update54:*:*:*:*:*:*",
              "matchCriteriaId": "01C3B7BE-1F9B-4EDA-990C-A4022CB85612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update55:*:*:*:*:*:*",
              "matchCriteriaId": "65CF766C-626D-4F8C-BDBF-F0C5404DD545",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update56:*:*:*:*:*:*",
              "matchCriteriaId": "720EF24C-9A36-405B-A380-6114C150B376",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update57:*:*:*:*:*:*",
              "matchCriteriaId": "44479EF5-40BD-43A2-AD0F-CE1660222AB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update58:*:*:*:*:*:*",
              "matchCriteriaId": "B8E0BD92-0F77-481E-8167-F81755E00703",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update59:*:*:*:*:*:*",
              "matchCriteriaId": "2BDB885E-814A-4CA8-A81C-1DB35989089B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update6:*:*:*:*:*:*",
              "matchCriteriaId": "653A0452-070F-4312-B94A-F5BCB01B9BDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update60:*:*:*:*:*:*",
              "matchCriteriaId": "B73DA1AE-C62F-4E62-AA98-5697656825F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update61:*:*:*:*:*:*",
              "matchCriteriaId": "D49DEE85-4DDB-4EF4-9F4D-11E7C1364055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update62:*:*:*:*:*:*",
              "matchCriteriaId": "365F28B6-DBF2-45BB-A06D-DD80CFBAD7BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update63:*:*:*:*:*:*",
              "matchCriteriaId": "5FDAD47C-C2DA-4533-AA58-DD6EC09A580A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update64:*:*:*:*:*:*",
              "matchCriteriaId": "5F81F36F-B20F-48B3-A1F2-3D319A34176B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update65:*:*:*:*:*:*",
              "matchCriteriaId": "754329CD-30B7-4410-A371-56A7C261B61B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update66:*:*:*:*:*:*",
              "matchCriteriaId": "C9445405-6B94-4DD1-BA94-B600AA316BB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update67:*:*:*:*:*:*",
              "matchCriteriaId": "960F3F22-9CC8-4655-9B09-777E5A5A1239",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update68:*:*:*:*:*:*",
              "matchCriteriaId": "D2B77C89-7F33-47A0-B6BF-473366033BEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update69:*:*:*:*:*:*",
              "matchCriteriaId": "8183B9D5-1C4D-4D30-BD85-13850FF34CB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update7:*:*:*:*:*:*",
              "matchCriteriaId": "15B67345-D0AF-4BFD-A62D-870F75306A4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update70:*:*:*:*:*:*",
              "matchCriteriaId": "1675366A-2388-4F7E-B423-D39BC7D3D38D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update71:*:*:*:*:*:*",
              "matchCriteriaId": "B93C3CF2-4F45-4F6C-AB6D-F9ABDA7C4DA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update72:*:*:*:*:*:*",
              "matchCriteriaId": "34A6A6A0-9307-4F5D-9605-1F786D1CD62A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update73:*:*:*:*:*:*",
              "matchCriteriaId": "6B994132-7103-4132-9D90-11CA264FEDE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update74:*:*:*:*:*:*",
              "matchCriteriaId": "A1958E04-AB8A-4B0E-AB45-B810CAED2EEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update75:*:*:*:*:*:*",
              "matchCriteriaId": "BB5558B0-6714-4B3A-B287-1943517A975A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update76:*:*:*:*:*:*",
              "matchCriteriaId": "7E325115-EEBC-41F4-8606-45270DA40B98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update77:*:*:*:*:*:*",
              "matchCriteriaId": "848B2C72-447D-46E2-A5A7-43CF3764E578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update78:*:*:*:*:*:*",
              "matchCriteriaId": "26A0AF15-52A9-46FD-8157-359141332EAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update79:*:*:*:*:*:*",
              "matchCriteriaId": "63D63872-C1D0-444F-BCC7-A514F323C256",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update8:*:*:*:*:*:*",
              "matchCriteriaId": "DE1F4262-A054-48CC-BF1D-AA77A94FFFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update80:*:*:*:*:*:*",
              "matchCriteriaId": "9D9FA9AD-39D3-412A-B794-E1B29EEEEC4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*",
              "matchCriteriaId": "294D8A56-A797-433C-A06E-106B2179151A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*",
              "matchCriteriaId": "824D88D9-4645-4CAD-8CAB-30F27DD388C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*",
              "matchCriteriaId": "F6E8C952-B455-46E4-AC3D-D38CAF189F60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*",
              "matchCriteriaId": "CD77C0EE-AC79-4443-A502-C1E02F806911",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*",
              "matchCriteriaId": "648EB53C-7A90-4DA6-BF1C-B5336CDE30C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update86:*:*:*:*:*:*",
              "matchCriteriaId": "39835EF7-8E93-4695-973D-6E9B76C67372",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update87:*:*:*:*:*:*",
              "matchCriteriaId": "2A05FB86-332B-44E3-93CB-82465A38976E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update88:*:*:*:*:*:*",
              "matchCriteriaId": "7C754823-899C-4EEF-ACB7-E1551FA88B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update89:*:*:*:*:*:*",
              "matchCriteriaId": "493D4C18-DEE2-4040-9C13-3A9AB2CE47BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update9:*:*:*:*:*:*",
              "matchCriteriaId": "D176CECA-2821-49EA-86EC-1184C133C0A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update90:*:*:*:*:*:*",
              "matchCriteriaId": "8F17DD75-E63B-4E4C-B136-D43F17B389EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update91:*:*:*:*:*:*",
              "matchCriteriaId": "62EE759A-78AD-40D6-8C5B-10403A8A4A89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update92:*:*:*:*:*:*",
              "matchCriteriaId": "865ABA1F-CA99-4602-B325-F81C9778855C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F2C2272-3E19-4836-BCA5-660208D5985D",
              "versionEndIncluding": "7.3.7",
              "versionStartIncluding": "7.3.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D6470C7-9D36-43F3-86CB-B79ED9EA53F4",
              "versionEndExcluding": "7.4.3.112",
              "versionStartIncluding": "7.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The workflow component in Liferay Portal 7.3.2 through 7.4.3.111, and Liferay DXP 2023.Q4.0 through 2023.Q4.5, 2023.Q3.1 through 2023.Q3.8, 7.4 GA through update 92 and 7.3 GA through update 36 does not properly check user permissions before updating a workflow definition, which allows remote authenticated users to modify workflow definitions and execute arbitrary code (RCE) via the headless API."
    },
    {
      "lang": "es",
      "value": " El componente workflow en Liferay Portal 7.3.2 a 7.4.3.111, y Liferay DXP 2023.Q4.0 a 2023.Q4.5, 2023.Q3.1 a 2023.Q3.8, 7.4 GA a la actualizaci\u00f3n 92 y 7.3 GA a la actualizaci\u00f3n 36 no verifica correctamente los permisos de usuario antes de actualizar una definici\u00f3n de workflow, lo que permite a los usuarios autenticados remotos modificar las definiciones de workflow y ejecutar c\u00f3digo arbitrario (RCE) a trav\u00e9s de la API sin interfaz gr\u00e1fica."
    }
  ],
  "id": "CVE-2024-38002",
  "lastModified": "2024-12-10T21:06:57.970",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.0,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 6.0,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-10-22T15:15:06.277",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2024-38002"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-863"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-863"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-07 15:15
Modified
2024-11-21 09:00
Summary
The Document and Media widget In Liferay Portal 7.2.0 through 7.3.6, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 13, and older unsupported versions, does not limit resource consumption when generating a preview image, which allows remote authenticated users to cause a denial of service (memory consumption) via crafted PNG images.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459",
              "versionEndExcluding": "7.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "73595C28-A21B-4C48-A326-33B0159B37A1",
              "versionEndExcluding": "7.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7CAF8FC-6334-48FD-A3E0-83EE307A5210",
              "versionEndIncluding": "7.2.1",
              "versionStartIncluding": "7.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "50D9A45F-2E4E-4371-9835-014E603F2792",
              "versionEndExcluding": "7.3.7",
              "versionStartIncluding": "7.3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Document and Media widget In Liferay Portal 7.2.0 through 7.3.6, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 13, and older unsupported versions, does not limit resource consumption when generating a preview image, which allows remote authenticated users to cause a denial of service (memory consumption) via crafted PNG images."
    },
    {
      "lang": "es",
      "value": "Document and Media widget In Liferay Portal 7.2.0 a 7.3.6 y versiones anteriores no compatibles, y Liferay DXP 7.3 anteriores al service pack 3, 7.2 anteriores al fix pack 13 y versiones anteriores no compatibles, no limita el consumo de recursos al generar una vista previa image, que permite a los usuarios autenticados remotamente provocar una denegaci\u00f3n de servicio (consumo de memoria) a trav\u00e9s de im\u00e1genes PNG manipuladas."
    }
  ],
  "id": "CVE-2024-25143",
  "lastModified": "2024-11-21T09:00:20.390",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-07T15:15:08.907",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25143"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25143"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-770"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-770"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-21 04:15
Modified
2025-01-28 02:28
Summary
The Calendar module in Liferay Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 15, and older unsupported versions does not escape user supplied data in the default notification email template, which allows remote authenticated users to inject arbitrary web script or HTML via the title of a calendar event or the user's name. This may lead to a content spoofing or cross-site scripting (XSS) attacks depending on the capability of the receiver's mail client.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC2000D2-4B65-4EAF-B0D5-09DDC0255580",
              "versionEndExcluding": "7.4.3.4",
              "versionStartIncluding": "7.2.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459",
              "versionEndExcluding": "7.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "43F61E2F-4643-4D5D-84DB-7B7B6E93C67B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "8B057D81-7589-4007-9A0D-2D302B82F9CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "6F0F2558-6990-43D7-9FE2-8E99D81B8269",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "11072673-C3AB-42EA-A26F-890DEE903D42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "134560B0-9746-4EC3-8DE3-26E53E2CAC6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Calendar module in Liferay Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 15, and older unsupported versions does not escape user supplied data in the default notification email template, which allows remote authenticated users to inject arbitrary web script or HTML via the title of a calendar event or the user\u0027s name. This may lead to a content spoofing or cross-site scripting (XSS) attacks depending on the capability of the receiver\u0027s mail client."
    },
    {
      "lang": "es",
      "value": "El m\u00f3dulo Calendario en Liferay Portal 7.2.0 a 7.4.2 y versiones anteriores no compatibles, y Liferay DXP 7.3 anteriores al service pack 3, 7.2 anteriores al fix pack 15 y versiones anteriores no compatibles no escapa a los datos proporcionados por el usuario en la plantilla de correo electr\u00f3nico de notificaci\u00f3n predeterminada , que permite a los usuarios autenticados remotamente inyectar script web o HTML arbitrarios a trav\u00e9s del t\u00edtulo de un evento del calendario o el nombre del usuario. Esto puede dar lugar a ataques de suplantaci\u00f3n de contenido o de Cross-site scripting (XSS), dependiendo de la capacidad del cliente de correo del receptor."
    }
  ],
  "id": "CVE-2024-25151",
  "lastModified": "2025-01-28T02:28:11.500",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-21T04:15:08.627",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25151"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25151"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-20 13:15
Modified
2025-01-28 21:35
Summary
The Image Uploader module in Liferay Portal 7.2.0 through 7.4.3.15, and older unsupported versions, and Liferay DXP 7.4 before update 16, 7.3 before update 4, 7.2 before fix pack 19, and older unsupported versions relies on a request parameter to limit the size of files that can be uploaded, which allows remote authenticated users to upload arbitrarily large files to the system's temp folder by modifying the `maxFileSize` parameter.
Impacted products
Vendor Product Version
liferay liferay_portal *
liferay liferay_portal *
liferay digital_experience_platform *
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1BD676-9B8D-44B0-9EAA-777EC43859DB",
              "versionEndIncluding": "7.3.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B40276-6D4F-49A5-AB91-D3BD7B8000C9",
              "versionEndExcluding": "7.4.3.16",
              "versionStartIncluding": "7.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459",
              "versionEndExcluding": "7.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "311EE92A-0EEF-4556-A52F-E6C9522FA2DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "49501C9E-D12A-45E0-92F3-8FD5FDC6D3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_17:*:*:*:*:*:*",
              "matchCriteriaId": "F2B55C77-9FAA-4E14-8CEF-9C4CAC804007",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_18:*:*:*:*:*:*",
              "matchCriteriaId": "54E499E6-C747-476B-BFE2-C04D9F8744F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "43F61E2F-4643-4D5D-84DB-7B7B6E93C67B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "8B057D81-7589-4007-9A0D-2D302B82F9CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "6F0F2558-6990-43D7-9FE2-8E99D81B8269",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "11072673-C3AB-42EA-A26F-890DEE903D42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "134560B0-9746-4EC3-8DE3-26E53E2CAC6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "71E41E59-D71F-48F0-812B-39D59F81997B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "728DF154-F19F-454C-87CA-1E755107F2A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
              "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update10:*:*:*:*:*:*",
              "matchCriteriaId": "C7B02106-D5EA-4A59-A959-CCE2AC8F55BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update11:*:*:*:*:*:*",
              "matchCriteriaId": "80204464-5DC5-4A52-B844-C833A96E6BD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update12:*:*:*:*:*:*",
              "matchCriteriaId": "6F8A5D02-0B45-4DA9-ACD8-42C1BFF62827",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update13:*:*:*:*:*:*",
              "matchCriteriaId": "38DA7C99-AC2C-4B9A-B611-4697159E1D79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update14:*:*:*:*:*:*",
              "matchCriteriaId": "F264AD07-D105-4F00-8920-6D8146E4FA63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update15:*:*:*:*:*:*",
              "matchCriteriaId": "C929CF16-4725-492A-872B-0928FE388FC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update2:*:*:*:*:*:*",
              "matchCriteriaId": "10B863B8-201D-494C-8175-168820996174",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update3:*:*:*:*:*:*",
              "matchCriteriaId": "CBF766CE-CBB8-472A-BAF0-BD39A7BCB4DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update4:*:*:*:*:*:*",
              "matchCriteriaId": "182FAA46-D9FB-4170-B305-BAD0DF6E5DE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update5:*:*:*:*:*:*",
              "matchCriteriaId": "DF1BB9E6-D690-4C12-AEF0-4BD712869CBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update6:*:*:*:*:*:*",
              "matchCriteriaId": "653A0452-070F-4312-B94A-F5BCB01B9BDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update7:*:*:*:*:*:*",
              "matchCriteriaId": "15B67345-D0AF-4BFD-A62D-870F75306A4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update8:*:*:*:*:*:*",
              "matchCriteriaId": "DE1F4262-A054-48CC-BF1D-AA77A94FFFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update9:*:*:*:*:*:*",
              "matchCriteriaId": "D176CECA-2821-49EA-86EC-1184C133C0A3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Image Uploader module in Liferay Portal 7.2.0 through 7.4.3.15, and older unsupported versions, and Liferay DXP 7.4 before update 16, 7.3 before update 4, 7.2 before fix pack 19, and older unsupported versions relies on a request parameter to limit the size of files that can be uploaded, which allows remote authenticated users to upload arbitrarily large files to the system\u0027s temp folder by modifying the `maxFileSize` parameter."
    },
    {
      "lang": "es",
      "value": "El m\u00f3dulo Image Uploader en Liferay Portal 7.2.0 a 7.4.3.15 y versiones anteriores no compatibles, y Liferay DXP 7.4 antes de la actualizaci\u00f3n 16, 7.3 antes de la actualizaci\u00f3n 4, 7.2 antes del fixpack 19 y versiones anteriores no compatibles se basa en un par\u00e1metro de solicitud para limitar el tama\u00f1o de los archivos que se pueden cargar, lo que permite a los usuarios autenticados remotamente cargar archivos arbitrariamente grandes a la carpeta temporal del sistema modificando el par\u00e1metro `maxFileSize`."
    }
  ],
  "id": "CVE-2024-26265",
  "lastModified": "2025-01-28T21:35:11.500",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 5.0,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 3.1,
        "impactScore": 1.4,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-20T13:15:08.673",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-26265"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-26265"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-770"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-770"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-11-15 02:15
Modified
2024-11-21 07:24
Summary
Certain Liferay products are affected by: Missing SSL Certificate Validation in the Dynamic Data Mapping module's REST data providers. This affects Liferay Portal 7.1.0 through 7.4.2 and Liferay DXP 7.1 before fix pack 27, 7.2 before fix pack 17, and 7.3 before service pack 3.
Impacted products
Vendor Product Version
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay liferay_portal *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "27DF695E-B890-42C2-8941-5BB53154755F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "072F6C59-3D86-48D1-A14E-477FFFA3B1D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "FE68B4A2-3459-4DBA-8BAC-E9AA9FA25264",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "680D7963-1393-4E86-A65F-D4463D532120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "D81E73DD-FD21-4082-A883-34422AE6C024",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "E6DD0451-98EA-4140-8294-77A14F063E2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "CE94E76B-8CC2-4E91-B7A3-EEBCC1358FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "408BD438-E15C-422F-9612-C62A7387FC63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "A78C8B1C-39CB-4C27-B57C-0AF5E7EB50D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_17:*:*:*:*:*:*",
              "matchCriteriaId": "0AB19E97-BACE-4FCC-A53F-078D61A7A9E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_18:*:*:*:*:*:*",
              "matchCriteriaId": "D18ACD28-9182-435C-A30F-DF3BFE13C39A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_19:*:*:*:*:*:*",
              "matchCriteriaId": "CFE4CC72-C15A-40DE-AFF4-0B6B79BFB2BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "386F0E26-78DC-4D59-A20F-B41D0E59561B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_20:*:*:*:*:*:*",
              "matchCriteriaId": "43C11288-1C48-47A0-95DF-A48F3C0285F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_21:*:*:*:*:*:*",
              "matchCriteriaId": "5ECF3B18-D0DB-4FB6-9F6F-B63A6CE45081",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_22:*:*:*:*:*:*",
              "matchCriteriaId": "79AC7C0B-4135-4C24-8D37-A9431156E3E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_23:*:*:*:*:*:*",
              "matchCriteriaId": "7289F71D-ECEB-4FB9-A53F-D3F4D1315ADD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_24:*:*:*:*:*:*",
              "matchCriteriaId": "C18AE68F-6EF0-4132-A3D8-C2D77A842137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_25:*:*:*:*:*:*",
              "matchCriteriaId": "4C5F0729-7B44-4B9E-949F-6A66D8176E11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_26:*:*:*:*:*:*",
              "matchCriteriaId": "B883C27E-3C14-4686-A0E8-8969B4246CDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "54576481-2AE9-4133-9EFA-B7FBDCA4427D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "E29CE810-76D5-4283-B102-70344B6C9506",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "DA869467-C560-4130-A180-86819F6A8673",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "CC0C94B7-31FB-4115-8EDE-62CC459B6663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "07DEAA71-53DA-4508-B7E6-924ABED49E66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "467323F6-5CA7-42A0-9810-C6FA694CEC93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "32EFFD8A-1C0D-446B-AAD7-5D23D483D3D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "311EE92A-0EEF-4556-A52F-E6C9522FA2DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "49501C9E-D12A-45E0-92F3-8FD5FDC6D3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "71B2CB88-0B25-4CFC-A223-B740E2847FD3",
              "versionEndExcluding": "7.4.3.4",
              "versionStartIncluding": "7.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Certain Liferay products are affected by: Missing SSL Certificate Validation in the Dynamic Data Mapping module\u0027s REST data providers. This affects Liferay Portal 7.1.0 through 7.4.2 and Liferay DXP 7.1 before fix pack 27, 7.2 before fix pack 17, and 7.3 before service pack 3."
    },
    {
      "lang": "es",
      "value": "Ciertos productos de Liferay se ven afectados por: Falta de Validaci\u00f3n de Certificado SSL en los proveedores de datos REST del m\u00f3dulo Dynamic Data Mapping. Esto afecta a Liferay Portal 7.1.0 a 7.4.2 y Liferay DXP 7.1 antes del fix pack 27, 7.2 antes del fix pack 17 y 7.3 antes del service pack 3."
    }
  ],
  "id": "CVE-2022-42131",
  "lastModified": "2024-11-21T07:24:25.820",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 2.5,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-11-15T02:15:12.087",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://issues.liferay.com/browse/LPE-17377"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42131"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://issues.liferay.com/browse/LPE-17377"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42131"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-295"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-05-24 16:15
Modified
2024-11-21 08:06
Summary
The Dynamic Data Mapping module in Liferay Portal 7.4.3.67, and Liferay DXP 7.4 update 67 does not limit Document and Media files which can be downloaded from a Form, which allows remote attackers to download any file from Document and Media via a crafted URL.
Impacted products
Vendor Product Version
liferay digital_experience_platform 7.4
liferay liferay_portal 7.4.3.67



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update67:*:*:*:*:*:*",
              "matchCriteriaId": "960F3F22-9CC8-4655-9B09-777E5A5A1239",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:7.4.3.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "6604D03B-8134-40FE-AEAF-41F77E5570DC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Dynamic Data Mapping module in Liferay Portal 7.4.3.67, and Liferay DXP 7.4 update 67 does not limit Document and Media files which can be downloaded from a Form, which allows remote attackers to download any file from Document and Media via a crafted URL."
    }
  ],
  "id": "CVE-2023-33948",
  "lastModified": "2024-11-21T08:06:16.280",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-05-24T16:15:10.007",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33948"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33948"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-862"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-862"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-05-24 17:15
Modified
2024-11-21 08:06
Summary
Pattern Redirects in Liferay Portal 7.4.3.48 through 7.4.3.76, and Liferay DXP 7.4 update 48 through 76 allows regular expressions that are vulnerable to ReDoS attacks to be used as patterns, which allows remote attackers to consume an excessive amount of server resources via crafted request URLs.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update48:*:*:*:*:*:*",
              "matchCriteriaId": "67F50AF8-7B0E-4D01-9EB2-C6625E9DACB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update76:*:*:*:*:*:*",
              "matchCriteriaId": "7E325115-EEBC-41F4-8606-45270DA40B98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7BD9AEF-1599-49B1-85E8-0B0DB56CE4C0",
              "versionEndIncluding": "7.4.3.76",
              "versionStartIncluding": "7.4.3.48",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Pattern Redirects in Liferay Portal 7.4.3.48 through 7.4.3.76, and Liferay DXP 7.4 update 48 through 76 allows regular expressions that are vulnerable to ReDoS attacks to be used as patterns, which allows remote attackers to consume an excessive amount of server resources via crafted request URLs."
    }
  ],
  "id": "CVE-2023-33950",
  "lastModified": "2024-11-21T08:06:16.530",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-05-24T17:15:10.007",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33950"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33950"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-1333"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-1333"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-04-25 16:16
Modified
2024-11-21 06:54
Summary
Cross-site scripting (XSS) vulnerability in the Layout module's Open Graph integration in Liferay Portal 7.3.0 through 7.4.0, and Liferay DXP 7.3 before service pack 3 allows remote attackers to inject arbitrary web script or HTML via the site name.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF5BFC45-3970-43D5-A064-D8785677E26C",
              "versionEndExcluding": "7.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "52877E3A-4E07-4B14-BABC-B70266FEFEDE",
              "versionEndIncluding": "7.4.0",
              "versionStartIncluding": "7.3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the Layout module\u0027s Open Graph integration in Liferay Portal 7.3.0 through 7.4.0, and Liferay DXP 7.3 before service pack 3 allows remote attackers to inject arbitrary web script or HTML via the site name."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de tipo cross-site scripting (XSS) en la integraci\u00f3n de Open Graph del m\u00f3dulo Layout en Liferay Portal 7.3.0 hasta 7.4.0, y Liferay DXP 7.3 antes del service pack 3 permite a atacantes remotos inyectar script web o HTML arbitrario por medio del nombre del sitio"
    }
  ],
  "id": "CVE-2022-26597",
  "lastModified": "2024-11-21T06:54:11.380",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-04-25T16:16:09.113",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://liferay.com"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-11-15 01:15
Modified
2024-11-21 07:24
Summary
The Hypermedia REST APIs module in Liferay Portal 7.4.1 through 7.4.3.4, and Liferay DXP 7.4 GA does not properly check permissions, which allows remote attackers to obtain a WikiNode object via the WikiNodeResource.getSiteWikiNodeByExternalReferenceCode API.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADEC0D76-B15D-4F90-BE93-DF2575A159ED",
              "versionEndExcluding": "7.4.3.5",
              "versionStartIncluding": "7.4.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Hypermedia REST APIs module in Liferay Portal 7.4.1 through 7.4.3.4, and Liferay DXP 7.4 GA does not properly check permissions, which allows remote attackers to obtain a WikiNode object via the WikiNodeResource.getSiteWikiNodeByExternalReferenceCode API."
    },
    {
      "lang": "es",
      "value": "El m\u00f3dulo Hypermedia REST APIs en Liferay Portal v7.4.1 a 7.4.3.4 y Liferay DXP 7.4 GA no comprueba correctamente los permisos, lo que permite a atacantes remotos obtener un objeto WikiNode a trav\u00e9s de la API WikiNodeResource.getSiteWikiNodeByExternalReferenceCode."
    }
  ],
  "id": "CVE-2022-42128",
  "lastModified": "2024-11-21T07:24:25.337",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-11-15T01:15:13.430",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://issues.liferay.com/browse/LPE-17595"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42128"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://issues.liferay.com/browse/LPE-17595"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42128"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-276"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-20 05:15
Modified
2025-02-12 18:51
Summary
Liferay Portal before 7.4.3.16 and Liferay DXP before 7.2 fix pack 19, 7.3 before update 6, and 7.4 before update 16 allow remote authenticated users to become the owner of a wiki page by editing the wiki page.
Impacted products
Vendor Product Version
liferay digital_experience_platform *
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay liferay_portal *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459",
              "versionEndExcluding": "7.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "311EE92A-0EEF-4556-A52F-E6C9522FA2DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "49501C9E-D12A-45E0-92F3-8FD5FDC6D3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_17:*:*:*:*:*:*",
              "matchCriteriaId": "F2B55C77-9FAA-4E14-8CEF-9C4CAC804007",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_18:*:*:*:*:*:*",
              "matchCriteriaId": "54E499E6-C747-476B-BFE2-C04D9F8744F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "43F61E2F-4643-4D5D-84DB-7B7B6E93C67B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "8B057D81-7589-4007-9A0D-2D302B82F9CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "6F0F2558-6990-43D7-9FE2-8E99D81B8269",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "11072673-C3AB-42EA-A26F-890DEE903D42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "134560B0-9746-4EC3-8DE3-26E53E2CAC6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "71E41E59-D71F-48F0-812B-39D59F81997B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "B6AAAAF1-994E-409D-8FC7-DE2A2CF60AD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "D70C8521-473E-4AA4-BBE8-02BED236383B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "728DF154-F19F-454C-87CA-1E755107F2A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update4:*:*:*:*:*:*",
              "matchCriteriaId": "AD408C73-7D78-4EB1-AA2C-F4A6D4DC980B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update5:*:*:*:*:*:*",
              "matchCriteriaId": "513F3229-7C31-44EB-88F6-E564BE725853",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
              "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update10:*:*:*:*:*:*",
              "matchCriteriaId": "C7B02106-D5EA-4A59-A959-CCE2AC8F55BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update11:*:*:*:*:*:*",
              "matchCriteriaId": "80204464-5DC5-4A52-B844-C833A96E6BD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update12:*:*:*:*:*:*",
              "matchCriteriaId": "6F8A5D02-0B45-4DA9-ACD8-42C1BFF62827",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update13:*:*:*:*:*:*",
              "matchCriteriaId": "38DA7C99-AC2C-4B9A-B611-4697159E1D79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update14:*:*:*:*:*:*",
              "matchCriteriaId": "F264AD07-D105-4F00-8920-6D8146E4FA63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update15:*:*:*:*:*:*",
              "matchCriteriaId": "C929CF16-4725-492A-872B-0928FE388FC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update2:*:*:*:*:*:*",
              "matchCriteriaId": "10B863B8-201D-494C-8175-168820996174",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update3:*:*:*:*:*:*",
              "matchCriteriaId": "CBF766CE-CBB8-472A-BAF0-BD39A7BCB4DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update4:*:*:*:*:*:*",
              "matchCriteriaId": "182FAA46-D9FB-4170-B305-BAD0DF6E5DE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update5:*:*:*:*:*:*",
              "matchCriteriaId": "DF1BB9E6-D690-4C12-AEF0-4BD712869CBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update6:*:*:*:*:*:*",
              "matchCriteriaId": "653A0452-070F-4312-B94A-F5BCB01B9BDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update7:*:*:*:*:*:*",
              "matchCriteriaId": "15B67345-D0AF-4BFD-A62D-870F75306A4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update8:*:*:*:*:*:*",
              "matchCriteriaId": "DE1F4262-A054-48CC-BF1D-AA77A94FFFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update9:*:*:*:*:*:*",
              "matchCriteriaId": "D176CECA-2821-49EA-86EC-1184C133C0A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "513C4959-418A-4E06-B0BC-5E812FEECC31",
              "versionEndExcluding": "7.4.3.16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Liferay Portal before 7.4.3.16 and Liferay DXP before 7.2 fix pack 19, 7.3 before update 6, and 7.4 before update 16 allow remote authenticated users to become the owner of a wiki page by editing the wiki page."
    },
    {
      "lang": "es",
      "value": "Liferay Portal anterior a 7.4.3.16 y Liferay DXP anterior a 7.2 fixpack 19, 7.3 anterior a la actualizaci\u00f3n 6 y 7.4 anterior a la actualizaci\u00f3n 16 permiten a los usuarios autenticados remotamente convertirse en propietarios de una p\u00e1gina wiki editando la p\u00e1gina wiki."
    }
  ],
  "id": "CVE-2022-45320",
  "lastModified": "2025-02-12T18:51:52.663",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 6.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-20T05:15:07.613",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2022-45320"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2022-45320"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-10-17 13:15
Modified
2024-11-21 08:22
Summary
Multiple stored cross-site scripting (XSS) vulnerabilities in the Commerce module in Liferay Portal 7.3.5 through 7.4.3.91, and Liferay DXP 7.3 update 33 and earlier, and 7.4 before update 92 allow remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a (1) Shipping Name, (2) Shipping Phone Number, (3) Shipping Address, (4) Shipping Address 2, (5) Shipping Address 3, (6) Shipping Zip, (7) Shipping City, (8) Shipping Region (9), Shipping Country, (10) Billing Name, (11) Billing Phone Number, (12) Billing Address, (13) Billing Address 2, (14) Billing Address 3, (15) Billing Zip, (16) Billing City, (17) Billing Region, (18) Billing Country, or (19) Region Code.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update14:*:*:*:*:*:*",
              "matchCriteriaId": "3E84D881-6D47-48FD-B743-9D531F5F7D5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
              "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update21:*:*:*:*:*:*",
              "matchCriteriaId": "22B6B8C1-1FF3-41BC-9576-16193AE20CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update34:*:*:*:*:*:*",
              "matchCriteriaId": "9D07DB20-9DCF-4C05-99D2-F6B37A082C14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update36:*:*:*:*:*:*",
              "matchCriteriaId": "1AB71307-7EAA-436A-9CBC-5A94F034FB48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update41:*:*:*:*:*:*",
              "matchCriteriaId": "2B256485-E289-4092-B45B-835DE12625B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update48:*:*:*:*:*:*",
              "matchCriteriaId": "67F50AF8-7B0E-4D01-9EB2-C6625E9DACB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*",
              "matchCriteriaId": "CCD1DEA0-8823-4780-B5EE-C1A2BB3C6B4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:*",
              "matchCriteriaId": "DC6FF5AB-B6E4-45D9-854B-29DEC200DA4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update62:*:*:*:*:*:*",
              "matchCriteriaId": "365F28B6-DBF2-45BB-A06D-DD80CFBAD7BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update67:*:*:*:*:*:*",
              "matchCriteriaId": "960F3F22-9CC8-4655-9B09-777E5A5A1239",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update76:*:*:*:*:*:*",
              "matchCriteriaId": "7E325115-EEBC-41F4-8606-45270DA40B98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*",
              "matchCriteriaId": "294D8A56-A797-433C-A06E-106B2179151A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*",
              "matchCriteriaId": "824D88D9-4645-4CAD-8CAB-30F27DD388C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*",
              "matchCriteriaId": "F6E8C952-B455-46E4-AC3D-D38CAF189F60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*",
              "matchCriteriaId": "CD77C0EE-AC79-4443-A502-C1E02F806911",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*",
              "matchCriteriaId": "648EB53C-7A90-4DA6-BF1C-B5336CDE30C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update86:*:*:*:*:*:*",
              "matchCriteriaId": "39835EF7-8E93-4695-973D-6E9B76C67372",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBB14237-26BD-48B6-9FE6-3CBC8DB49A0D",
              "versionEndExcluding": "7.4.3.92",
              "versionStartIncluding": "7.3.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple stored cross-site scripting (XSS) vulnerabilities in the Commerce module in Liferay Portal 7.3.5 through 7.4.3.91, and Liferay DXP 7.3 update 33 and earlier, and 7.4 before update 92 allow remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a (1) Shipping Name, (2) Shipping Phone Number, (3) Shipping Address, (4) Shipping Address 2, (5) Shipping Address 3, (6) Shipping Zip, (7) Shipping City, (8) Shipping Region (9), Shipping Country, (10) Billing Name, (11) Billing Phone Number, (12) Billing Address, (13) Billing Address 2, (14) Billing Address 3, (15) Billing Zip, (16) Billing City, (17) Billing Region, (18) Billing Country, or (19) Region Code."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de Cross-Site Scripting (XSS) almacenados en el m\u00f3dulo Commerce en Liferay Portal 7.3.5 hasta 7.4.3.91, y Liferay DXP 7.3 actualizaci\u00f3n 33 y anteriores, y 7.4 antes de la actualizaci\u00f3n 92 permiten a atacantes remotos inyectar scripts web o HTML arbitrarios mediante un payload manipulado inyectado en (1) Nombre de Env\u00edo, (2) N\u00famero de Tel\u00e9fono de Env\u00edo, (3) Direcci\u00f3n de Env\u00edo, (4) Direcci\u00f3n de Env\u00edo 2, (5) Direcci\u00f3n de Env\u00edo 3, (6) C\u00f3digo Postal de Env\u00edo, (7) Ciudad de Env\u00edo , (8) Regi\u00f3n de Env\u00edo (9), Pa\u00eds de Env\u00edo, (10) Nombre de Facturaci\u00f3n, (11) N\u00famero de Tel\u00e9fono de Facturaci\u00f3n, (12) Direcci\u00f3n de Facturaci\u00f3n, (13) Direcci\u00f3n de Facturaci\u00f3n 2, (14) Direcci\u00f3n de Facturaci\u00f3n 3, (15) Facturaci\u00f3n C\u00f3digo Postal, (16) Ciudad de Facturaci\u00f3n, (17) Regi\u00f3n de Facturaci\u00f3n, (18) Pa\u00eds de Facturaci\u00f3n o (19) C\u00f3digo de Regi\u00f3n."
    }
  ],
  "id": "CVE-2023-42627",
  "lastModified": "2024-11-21T08:22:50.247",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.6,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 6.0,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-10-17T13:15:11.677",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-42627"
    },
    {
      "source": "security@liferay.com",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.pentagrid.ch/en/blog/stored-cross-site-scripting-vulnerabilities-in-liferay-portal/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-42627"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.pentagrid.ch/en/blog/stored-cross-site-scripting-vulnerabilities-in-liferay-portal/"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-05-24 15:15
Modified
2024-11-21 08:06
Summary
Cross-site scripting (XSS) vulnerability in the Web Content Display widget's article selector in Liferay Liferay Portal 7.4.3.50, and Liferay DXP 7.4 update 50 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a web content article's `Title` field.
Impacted products
Vendor Product Version
liferay digital_experience_platform 7.4
liferay liferay_portal 7.4.3.50



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*",
              "matchCriteriaId": "CCD1DEA0-8823-4780-B5EE-C1A2BB3C6B4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:7.4.3.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "85FAEA65-56C6-49F2-9F40-207496267879",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the Web Content Display widget\u0027s article selector in Liferay Liferay Portal 7.4.3.50, and Liferay DXP 7.4 update 50 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a web content article\u0027s `Title` field."
    }
  ],
  "id": "CVE-2023-33942",
  "lastModified": "2024-11-21T08:06:15.487",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-05-24T15:15:09.807",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33942"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33942"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-05-24 16:15
Modified
2024-11-21 08:06
Summary
The Object module in Liferay Portal 7.4.3.4 through 7.4.3.48, and Liferay DXP 7.4 before update 49 does properly isolate objects in difference virtual instances, which allows remote authenticated users in one virtual instance to view objects in a different virtual instance via OAuth 2 scope administration page.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
              "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update34:*:*:*:*:*:*",
              "matchCriteriaId": "9D07DB20-9DCF-4C05-99D2-F6B37A082C14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update36:*:*:*:*:*:*",
              "matchCriteriaId": "1AB71307-7EAA-436A-9CBC-5A94F034FB48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADDAE58B-FC6A-496E-A655-92D78299FDFE",
              "versionEndIncluding": "7.4.3.48",
              "versionStartIncluding": "7.4.3.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Object module in Liferay Portal 7.4.3.4 through 7.4.3.48, and Liferay DXP 7.4 before update 49 does properly isolate objects in difference virtual instances, which allows remote authenticated users in one virtual instance to view objects in a different virtual instance via OAuth 2 scope administration page."
    }
  ],
  "id": "CVE-2023-33946",
  "lastModified": "2024-11-21T08:06:15.993",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 2.7,
          "baseSeverity": "LOW",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 1.4,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-05-24T16:15:09.837",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33946"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33946"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-284"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-12-17 21:15
Modified
2025-01-28 21:18
Summary
Reflected cross-site scripting (XSS) vulnerability in Liferay Portal 7.1.0 through 7.4.3.38, and Liferay DXP 7.4 GA through update 38, 7.3 GA through update 36, 7.2 GA through fix pack 20 and 7.1 GA through fix pack 28 allows remote attackers to execute arbitrary web script or HTML via Dispatch name field
Impacted products
Vendor Product Version
liferay liferay_portal *
liferay digital_experience_platform *
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA343855-76B8-47E3-BBB3-31374B1CD8BA",
              "versionEndExcluding": "7.4.3.39",
              "versionStartIncluding": "7.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DDBD8B4-51C6-4D66-8B59-E61BEDF90D30",
              "versionEndExcluding": "7.4",
              "versionStartIncluding": "7.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
              "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update10:*:*:*:*:*:*",
              "matchCriteriaId": "C7B02106-D5EA-4A59-A959-CCE2AC8F55BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update11:*:*:*:*:*:*",
              "matchCriteriaId": "80204464-5DC5-4A52-B844-C833A96E6BD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update12:*:*:*:*:*:*",
              "matchCriteriaId": "6F8A5D02-0B45-4DA9-ACD8-42C1BFF62827",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update13:*:*:*:*:*:*",
              "matchCriteriaId": "38DA7C99-AC2C-4B9A-B611-4697159E1D79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update14:*:*:*:*:*:*",
              "matchCriteriaId": "F264AD07-D105-4F00-8920-6D8146E4FA63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update15:*:*:*:*:*:*",
              "matchCriteriaId": "C929CF16-4725-492A-872B-0928FE388FC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update16:*:*:*:*:*:*",
              "matchCriteriaId": "1B8750A1-E481-48D4-84F4-97D1ABE15B46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update17:*:*:*:*:*:*",
              "matchCriteriaId": "454F8410-D9AC-481E-841C-60F0DF2CC25E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update18:*:*:*:*:*:*",
              "matchCriteriaId": "D1A442EE-460F-4823-B9EF-4421050F0847",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update19:*:*:*:*:*:*",
              "matchCriteriaId": "608B205D-0B79-4D1C-B2C1-64C31DB1896E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update2:*:*:*:*:*:*",
              "matchCriteriaId": "10B863B8-201D-494C-8175-168820996174",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update20:*:*:*:*:*:*",
              "matchCriteriaId": "4427DC78-E80C-4057-A295-B0731437A99E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update21:*:*:*:*:*:*",
              "matchCriteriaId": "22B6B8C1-1FF3-41BC-9576-16193AE20CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update22:*:*:*:*:*:*",
              "matchCriteriaId": "DDA17F24-1A7E-4BEB-9C98-41761A2A36A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update23:*:*:*:*:*:*",
              "matchCriteriaId": "3B062851-CE6B-44F4-8222-422EC9872EC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update24:*:*:*:*:*:*",
              "matchCriteriaId": "D4687FDA-0078-4E89-ADD8-7EDDA68261A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update25:*:*:*:*:*:*",
              "matchCriteriaId": "7EA29B09-CC24-4063-96A5-96AA08C0886D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update26:*:*:*:*:*:*",
              "matchCriteriaId": "331FC246-D3E9-4711-B305-BE51BF743CF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update27:*:*:*:*:*:*",
              "matchCriteriaId": "A5823BC0-8C11-4C31-9E99-3C9D82918E2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update28:*:*:*:*:*:*",
              "matchCriteriaId": "E2E6CB66-1AE1-4626-8070-64C250ED8363",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update29:*:*:*:*:*:*",
              "matchCriteriaId": "B63449AA-6831-4290-B1FA-0BB806820402",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update3:*:*:*:*:*:*",
              "matchCriteriaId": "CBF766CE-CBB8-472A-BAF0-BD39A7BCB4DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update30:*:*:*:*:*:*",
              "matchCriteriaId": "B3B169F6-B8B8-4612-AD7D-F75CC6A9297B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update31:*:*:*:*:*:*",
              "matchCriteriaId": "12D46756-D26D-4877-ACE8-1C2721908428",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update32:*:*:*:*:*:*",
              "matchCriteriaId": "5403DCEF-20C2-4568-8DF1-30804F522915",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update33:*:*:*:*:*:*",
              "matchCriteriaId": "90E39742-90BE-4DEB-AB78-F9B8F7333F9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update34:*:*:*:*:*:*",
              "matchCriteriaId": "9D07DB20-9DCF-4C05-99D2-F6B37A082C14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update35:*:*:*:*:*:*",
              "matchCriteriaId": "341D1157-8118-4BD3-A902-36E90E066706",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update36:*:*:*:*:*:*",
              "matchCriteriaId": "1AB71307-7EAA-436A-9CBC-5A94F034FB48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update37:*:*:*:*:*:*",
              "matchCriteriaId": "9446B3A5-6647-416C-92AF-7B6E0E929765",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update38:*:*:*:*:*:*",
              "matchCriteriaId": "06386C7A-CAA1-4FC4-9182-5A66342FB903",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update4:*:*:*:*:*:*",
              "matchCriteriaId": "182FAA46-D9FB-4170-B305-BAD0DF6E5DE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update5:*:*:*:*:*:*",
              "matchCriteriaId": "DF1BB9E6-D690-4C12-AEF0-4BD712869CBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update6:*:*:*:*:*:*",
              "matchCriteriaId": "653A0452-070F-4312-B94A-F5BCB01B9BDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update7:*:*:*:*:*:*",
              "matchCriteriaId": "15B67345-D0AF-4BFD-A62D-870F75306A4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update8:*:*:*:*:*:*",
              "matchCriteriaId": "DE1F4262-A054-48CC-BF1D-AA77A94FFFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update9:*:*:*:*:*:*",
              "matchCriteriaId": "D176CECA-2821-49EA-86EC-1184C133C0A3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Reflected cross-site scripting (XSS) vulnerability in Liferay Portal 7.1.0 through 7.4.3.38, and Liferay DXP 7.4 GA through update 38, 7.3 GA through update 36, 7.2 GA through fix pack 20 and 7.1 GA through fix pack 28 allows remote attackers to execute arbitrary web script or HTML via Dispatch name field"
    },
    {
      "lang": "es",
      "value": "La vulnerabilidad de cross-site scripting (XSS) reflejado en Liferay Portal 7.1.0 a 7.4.3.38 y Liferay DXP 7.4 GA a la actualizaci\u00f3n 38, 7.3 GA a la actualizaci\u00f3n 36, 7.2 GA a la actualizaci\u00f3n 20 y 7.1 GA a la actualizaci\u00f3n 28 permite a atacantes remotos ejecutar secuencias de comandos web o HTML arbitrarios a trav\u00e9s del campo de nombre de Dispatch"
    }
  ],
  "id": "CVE-2024-11993",
  "lastModified": "2025-01-28T21:18:09.027",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "automatable": "NOT_DEFINED",
          "availabilityRequirements": "NOT_DEFINED",
          "baseScore": 4.6,
          "baseSeverity": "MEDIUM",
          "confidentialityRequirements": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirements": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubsequentSystemAvailability": "NOT_DEFINED",
          "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
          "modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnerableSystemAvailability": "NOT_DEFINED",
          "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
          "modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
          "privilegesRequired": "HIGH",
          "providerUrgency": "NOT_DEFINED",
          "recovery": "NOT_DEFINED",
          "safety": "NOT_DEFINED",
          "subsequentSystemAvailability": "NONE",
          "subsequentSystemConfidentiality": "LOW",
          "subsequentSystemIntegrity": "LOW",
          "userInteraction": "ACTIVE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnerabilityResponseEffort": "NOT_DEFINED",
          "vulnerableSystemAvailability": "NONE",
          "vulnerableSystemConfidentiality": "LOW",
          "vulnerableSystemIntegrity": "LOW"
        },
        "source": "security@liferay.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-12-17T21:15:07.013",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2024-11993"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security@liferay.com",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-09-22 18:15
Modified
2024-11-21 05:06
Summary
Liferay Portal before 7.3.3, and Liferay DXP 7.1 before fix pack 18 and 7.2 before fix pack 6, does not restrict the size of a multipart/form-data POST action, which allows remote authenticated users to conduct denial-of-service attacks by uploading large files.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "27DF695E-B890-42C2-8941-5BB53154755F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "072F6C59-3D86-48D1-A14E-477FFFA3B1D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "FE68B4A2-3459-4DBA-8BAC-E9AA9FA25264",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "680D7963-1393-4E86-A65F-D4463D532120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "D81E73DD-FD21-4082-A883-34422AE6C024",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "E6DD0451-98EA-4140-8294-77A14F063E2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "CE94E76B-8CC2-4E91-B7A3-EEBCC1358FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "408BD438-E15C-422F-9612-C62A7387FC63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "A78C8B1C-39CB-4C27-B57C-0AF5E7EB50D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_17:*:*:*:*:*:*",
              "matchCriteriaId": "0AB19E97-BACE-4FCC-A53F-078D61A7A9E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "386F0E26-78DC-4D59-A20F-B41D0E59561B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "54576481-2AE9-4133-9EFA-B7FBDCA4427D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "E29CE810-76D5-4283-B102-70344B6C9506",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "DA869467-C560-4130-A180-86819F6A8673",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "CC0C94B7-31FB-4115-8EDE-62CC459B6663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "07DEAA71-53DA-4508-B7E6-924ABED49E66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "467323F6-5CA7-42A0-9810-C6FA694CEC93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "32EFFD8A-1C0D-446B-AAD7-5D23D483D3D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "58CE2C64-BC5F-4281-AD98-B2C4B24A949C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "94896449-7A52-40D2-8E76-26DC60D7BA9A",
              "versionEndExcluding": "7.3.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Liferay Portal before 7.3.3, and Liferay DXP 7.1 before fix pack 18 and 7.2 before fix pack 6, does not restrict the size of a multipart/form-data POST action, which allows remote authenticated users to conduct denial-of-service attacks by uploading large files."
    },
    {
      "lang": "es",
      "value": "Liferay Portal versiones anteriores a 7.3.3, y Liferay DXP versiones 7.1 anteriores a fixpack 18 y versiones 7.2 anteriores a fixpack 6, no reucir ataques de denegaci\u00f3n de servicio mediante la carga de archivos grandes"
    }
  ],
  "id": "CVE-2020-15839",
  "lastModified": "2024-11-21T05:06:17.603",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-09-22T18:15:23.980",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://issues.liferay.com/browse/LPE-17029"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://issues.liferay.com/browse/LPE-17055"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/119784928"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://issues.liferay.com/browse/LPE-17029"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://issues.liferay.com/browse/LPE-17055"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/119784928"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-434"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-20 09:15
Modified
2024-12-10 22:20
Summary
The Journal module in Liferay Portal 7.2.0 through 7.4.3.4, and older unsupported versions, and Liferay DXP 7.4.13, 7.3 before service pack 3, 7.2 before fix pack 17, and older unsupported versions grants guest users view permission to web content templates by default, which allows remote attackers to view any template via the UI or API.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459",
              "versionEndExcluding": "7.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "311EE92A-0EEF-4556-A52F-E6C9522FA2DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "49501C9E-D12A-45E0-92F3-8FD5FDC6D3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "43F61E2F-4643-4D5D-84DB-7B7B6E93C67B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "8B057D81-7589-4007-9A0D-2D302B82F9CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "6F0F2558-6990-43D7-9FE2-8E99D81B8269",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "11072673-C3AB-42EA-A26F-890DEE903D42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "134560B0-9746-4EC3-8DE3-26E53E2CAC6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E04E0EDA-8E18-43C3-A0B2-DF45B7CE811D",
              "versionEndExcluding": "7.4.3.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Journal module in Liferay Portal 7.2.0 through 7.4.3.4, and older unsupported versions, and Liferay DXP 7.4.13, 7.3 before service pack 3, 7.2 before fix pack 17, and older unsupported versions grants guest users view permission to web content templates by default, which allows remote attackers to view any template via the UI or API."
    },
    {
      "lang": "es",
      "value": "El m\u00f3dulo Journal en Liferay Portal 7.2.0 a 7.4.3.4 y versiones anteriores no compatibles, y Liferay DXP 7.4.13, 7.3 anteriores al service pack 3, 7.2 anteriores al fix pack 17 y versiones anteriores no compatibles otorga a los usuarios invitados permiso de visualizaci\u00f3n del contenido web plantillas de forma predeterminada, lo que permite a atacantes remotos ver cualquier plantilla a trav\u00e9s de la interfaz de usuario o API."
    }
  ],
  "id": "CVE-2024-25605",
  "lastModified": "2024-12-10T22:20:47.737",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-20T09:15:09.323",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25605"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25605"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-276"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-276"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-21 02:15
Modified
2025-01-28 21:26
Summary
Stored cross-site scripting (XSS) vulnerability in Expando module's geolocation custom fields in Liferay Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 17, and older unsupported versions allows remote authenticated users to inject arbitrary web script or HTML via a crafted payload injected into the name text field of a geolocation custom field.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "831BFAEF-E7B6-4E84-9142-79B93FBA0E8A",
              "versionEndExcluding": "7.4.3.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459",
              "versionEndExcluding": "7.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "311EE92A-0EEF-4556-A52F-E6C9522FA2DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "49501C9E-D12A-45E0-92F3-8FD5FDC6D3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "43F61E2F-4643-4D5D-84DB-7B7B6E93C67B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "8B057D81-7589-4007-9A0D-2D302B82F9CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "6F0F2558-6990-43D7-9FE2-8E99D81B8269",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "11072673-C3AB-42EA-A26F-890DEE903D42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "134560B0-9746-4EC3-8DE3-26E53E2CAC6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stored cross-site scripting (XSS) vulnerability in Expando module\u0027s geolocation custom fields in Liferay Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 17, and older unsupported versions allows remote authenticated users to inject arbitrary web script or HTML via a crafted payload injected into the name text field of a geolocation custom field."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de Cross-site scripting (XSS) almacenadas en los campos personalizados de geolocalizaci\u00f3n del m\u00f3dulo Expando en Liferay Portal 7.2.0 a 7.4.2 y versiones anteriores no compatibles, y Liferay DXP 7.3 anteriores al service pack 3, 7.2 anteriores al fix pack 17 y versiones anteriores no compatibles permite a usuarios remotos autenticados inyectar script web o HTML arbitrario a trav\u00e9s de un payload manipulado inyectado en el campo de texto del nombre de un campo personalizado de geolocalizaci\u00f3n."
    }
  ],
  "id": "CVE-2024-25601",
  "lastModified": "2025-01-28T21:26:17.863",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.0,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 6.0,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-21T02:15:30.100",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25601"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25601"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-03-03 00:15
Modified
2024-11-21 06:16
Summary
Cross-site scripting (XSS) vulnerability in the Blogs module's edit blog entry page in Liferay Portal 7.3.2 through 7.3.6, and Liferay DXP 7.3 before fix pack 2 allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_blogs_web_portlet_BlogsAdminPortlet_title and _com_liferay_blogs_web_portlet_BlogsAdminPortlet_subtitle parameter.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF5BFC45-3970-43D5-A064-D8785677E26C",
              "versionEndExcluding": "7.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "25C6FBAD-AECD-4DE9-9C2F-6A935540FCA5",
              "versionEndIncluding": "7.3.6",
              "versionStartIncluding": "7.3.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the Blogs module\u0027s edit blog entry page in Liferay Portal 7.3.2 through 7.3.6, and Liferay DXP 7.3 before fix pack 2 allows remote attackers to inject arbitrary web script or HTML via the _com_liferay_blogs_web_portlet_BlogsAdminPortlet_title and _com_liferay_blogs_web_portlet_BlogsAdminPortlet_subtitle parameter."
    },
    {
      "lang": "es",
      "value": "La vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en la p\u00e1gina de edici\u00f3n de entradas de blog del m\u00f3dulo Blogs en Liferay Portal 7.3.2 a 7.3.6, y Liferay DXP 7.3 antes del paquete de correcciones 2 permite a los atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s del par\u00e1metro _com_liferay_blogs_web_portlet_BlogsAdminPortlet_title y _com_liferay_blogs_web_portlet_BlogsAdminPortlet_subtitle"
    }
  ],
  "id": "CVE-2021-38267",
  "lastModified": "2024-11-21T06:16:42.627",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-03-03T00:15:08.067",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Product"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38267-stored-xss-with-title-and-subtitle-of-blog-entry"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Product"
      ],
      "url": "http://liferay.com"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2021-38267-stored-xss-with-title-and-subtitle-of-blog-entry"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-05-24 16:15
Modified
2024-11-21 08:06
Summary
The Object module in Liferay Portal 7.4.3.4 through 7.4.3.60, and Liferay DXP 7.4 before update 61 does not segment object definition by virtual instance in search which allows remote authenticated users in one virtual instance to view object definition from a second virtual instance by searching for the object definition.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
              "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update21:*:*:*:*:*:*",
              "matchCriteriaId": "22B6B8C1-1FF3-41BC-9576-16193AE20CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update34:*:*:*:*:*:*",
              "matchCriteriaId": "9D07DB20-9DCF-4C05-99D2-F6B37A082C14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update36:*:*:*:*:*:*",
              "matchCriteriaId": "1AB71307-7EAA-436A-9CBC-5A94F034FB48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update41:*:*:*:*:*:*",
              "matchCriteriaId": "2B256485-E289-4092-B45B-835DE12625B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*",
              "matchCriteriaId": "CCD1DEA0-8823-4780-B5EE-C1A2BB3C6B4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:*",
              "matchCriteriaId": "DC6FF5AB-B6E4-45D9-854B-29DEC200DA4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC519823-5316-4E91-B6D2-32E26A6D18FA",
              "versionEndIncluding": "7.4.3.60",
              "versionStartIncluding": "7.4.3.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Object module in Liferay Portal 7.4.3.4 through 7.4.3.60, and Liferay DXP 7.4 before update 61 does not segment object definition by virtual instance in search which allows remote authenticated users in one virtual instance to view object definition from a second virtual instance by searching for the object definition."
    }
  ],
  "id": "CVE-2023-33947",
  "lastModified": "2024-11-21T08:06:16.133",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 2.7,
          "baseSeverity": "LOW",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 1.4,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-05-24T16:15:09.927",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33947"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33947"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-284"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-05-24 14:15
Modified
2024-11-21 08:06
Summary
Cross-site scripting (XSS) vulnerability in the Modified Facet widget in Liferay Portal 7.1.0 through 7.4.3.12, and Liferay DXP 7.1 before fix pack 27, 7.2 before fix pack 18, 7.3 before update 4, and 7.4 before update 9 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a facet label.
Impacted products
Vendor Product Version
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.1
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.2
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.3
liferay digital_experience_platform 7.4
liferay digital_experience_platform 7.4
liferay liferay_portal *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "27DF695E-B890-42C2-8941-5BB53154755F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "072F6C59-3D86-48D1-A14E-477FFFA3B1D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "FE68B4A2-3459-4DBA-8BAC-E9AA9FA25264",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "680D7963-1393-4E86-A65F-D4463D532120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "D81E73DD-FD21-4082-A883-34422AE6C024",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "E6DD0451-98EA-4140-8294-77A14F063E2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "CE94E76B-8CC2-4E91-B7A3-EEBCC1358FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "408BD438-E15C-422F-9612-C62A7387FC63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "A78C8B1C-39CB-4C27-B57C-0AF5E7EB50D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_17:*:*:*:*:*:*",
              "matchCriteriaId": "0AB19E97-BACE-4FCC-A53F-078D61A7A9E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_18:*:*:*:*:*:*",
              "matchCriteriaId": "D18ACD28-9182-435C-A30F-DF3BFE13C39A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_19:*:*:*:*:*:*",
              "matchCriteriaId": "CFE4CC72-C15A-40DE-AFF4-0B6B79BFB2BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "386F0E26-78DC-4D59-A20F-B41D0E59561B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_20:*:*:*:*:*:*",
              "matchCriteriaId": "43C11288-1C48-47A0-95DF-A48F3C0285F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_21:*:*:*:*:*:*",
              "matchCriteriaId": "5ECF3B18-D0DB-4FB6-9F6F-B63A6CE45081",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_22:*:*:*:*:*:*",
              "matchCriteriaId": "79AC7C0B-4135-4C24-8D37-A9431156E3E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_23:*:*:*:*:*:*",
              "matchCriteriaId": "7289F71D-ECEB-4FB9-A53F-D3F4D1315ADD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_24:*:*:*:*:*:*",
              "matchCriteriaId": "C18AE68F-6EF0-4132-A3D8-C2D77A842137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_25:*:*:*:*:*:*",
              "matchCriteriaId": "4C5F0729-7B44-4B9E-949F-6A66D8176E11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_26:*:*:*:*:*:*",
              "matchCriteriaId": "B883C27E-3C14-4686-A0E8-8969B4246CDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "54576481-2AE9-4133-9EFA-B7FBDCA4427D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "E29CE810-76D5-4283-B102-70344B6C9506",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "DA869467-C560-4130-A180-86819F6A8673",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "CC0C94B7-31FB-4115-8EDE-62CC459B6663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "07DEAA71-53DA-4508-B7E6-924ABED49E66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "467323F6-5CA7-42A0-9810-C6FA694CEC93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.1:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "32EFFD8A-1C0D-446B-AAD7-5D23D483D3D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*",
              "matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*",
              "matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*",
              "matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*",
              "matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*",
              "matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_15:*:*:*:*:*:*",
              "matchCriteriaId": "311EE92A-0EEF-4556-A52F-E6C9522FA2DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_16:*:*:*:*:*:*",
              "matchCriteriaId": "49501C9E-D12A-45E0-92F3-8FD5FDC6D3CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*",
              "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*",
              "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*",
              "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*",
              "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
              "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "94AA76F2-5073-4F3D-9C90-0D44689F873A",
              "versionEndIncluding": "7.4.3.12",
              "versionStartIncluding": "7.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the Modified Facet widget in Liferay Portal 7.1.0 through 7.4.3.12, and Liferay DXP 7.1 before fix pack 27, 7.2 before fix pack 18, 7.3 before update 4, and 7.4 before update 9 allows remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a facet label."
    }
  ],
  "id": "CVE-2023-33939",
  "lastModified": "2024-11-21T08:06:14.710",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "security@liferay.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-05-24T14:15:09.623",
  "references": [
    {
      "source": "security@liferay.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33939"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-33939"
    }
  ],
  "sourceIdentifier": "security@liferay.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security@liferay.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}