Multiple vulnerabilities in Liferay Portal

Published: 2017-08-08 14:41:17
Severity Medium
Patch available YES
Number of vulnerabilities 4
CVE ID N/A
CVSSv3 5.1 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L/E:U/RL:O/RC:C]
3.8 [CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
5.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]
4.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CWE ID CWE-400
CWE-20
CWE-79
CWE-200
Exploitation vector Network
Public exploit N/A
Vulnerable software Liferay Enterprise Portal
Vulnerable software versions Liferay Enterprise Portal 7.0.3 GA4
Liferay Enterprise Portal 7.0.0 GA1
Liferay Enterprise Portal 7.0.1 GA2

Show more

Vendor URL Liferay

Security Advisory

1) Denial of service

Description

The vulnerability allows a remote attacker to perform a denial of service attack.

The vulnerability exists due to errors in AggregateFilter, MinifierFilter and DynamicCSSFilter components. A remote attacker can use a specially crafted URL to consume all available disk space on the system and cause denial of service (DoS) conditions.

 

Remediation

Install update from vendor's repository:
https://sourceforge.net/projects/liferay-patches/files/7.0.3%20GA4/
https://github.com/community-security-team/liferay-portal/compare/7.0.3-ga4...7.0.3-CST-7028.patch

External links

https://dev.liferay.com/web/community-security-team/known-vulnerabilities/-/asset_publisher/4AHAYapU...

2) Improper input validation

Description

The vulnerability allows a remote attacker to perform a denial of service attack.

The vulnerability exists due to insufficient input sanitization when creating or editing Wiki pages. A remote authenticated attacker with permissions to create or edit a Wiki page can cause a denial of service (DoS) in the portal via crafted form parameters.

Remediation

Install update from vendor's repository:
https://sourceforge.net/projects/liferay-patches/files/7.0.3%20GA4/
https://github.com/community-security-team/liferay-portal/compare/7.0.3-ga4...7.0.3-CST-7029.patch

External links

https://dev.liferay.com/web/community-security-team/known-vulnerabilities/-/asset_publisher/4AHAYapU...

3) Cross-site scripting

Description

The vulnerability allows a remote attacker to perform XSS attacks.

The vulnerability exists due to insufficient input sanitization in various web application components. A remote attacker can trick the victim into visiting a specially crafted link and execute arbitrary HTML and script code in victim’s browser in security context of the affected website.

Remediation

Install update from vendor's repository:
https://sourceforge.net/projects/liferay-patches/files/7.0.3%20GA4/
https://github.com/community-security-team/liferay-portal/compare/7.0.3-ga4...7.0.3-CST-7030.patch

External links

https://dev.liferay.com/web/community-security-team/known-vulnerabilities/-/asset_publisher/4AHAYapU...

4) Information disclosure

Description

The vulnerability allows a remote attacker to obtain potentially sensitive data.

The vulnerability exists due to excessive data output. A remote attacker can use a specially crafted URL to obtain path to all OSGi bundles.

Remediation

Install update from vendor's repository:
https://sourceforge.net/projects/liferay-patches/files/7.0.3%20GA4/
https://github.com/community-security-team/liferay-portal/compare/7.0.3-ga4...7.0.3-CST-7032.patch

External links

https://dev.liferay.com/web/community-security-team/known-vulnerabilities/-/asset_publisher/4AHAYapU...

Back to List