SB2019042214 - OS Command Injection in Liferay Enterprise Portal



SB2019042214 - OS Command Injection in Liferay Enterprise Portal

Published: April 22, 2019 Updated: August 8, 2020

Security Bulletin ID SB2019042214
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) OS Command Injection (CVE-ID: CVE-2019-11444)

The vulnerability allows a remote privileged user to execute arbitrary code.

** DISPUTED ** An issue was discovered in Liferay Portal CE 7.1.2 GA3. An attacker can use Liferay's Groovy script console to execute OS commands. Commands can be executed via a [command].execute() call, as demonstrated by "def cmd =" in the ServerAdminPortlet_script value to group/control_panel/manage. Valid credentials for an application administrator user account are required. NOTE: The developer disputes this as a vulnerability since it is a feature for administrators to run groovy scripts and therefore not a design flaw.


Remediation

Install update from vendor's website.