Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2022-42114 CVE-2022-42115 CVE-2022-42127 |
CWE-ID | CWE-79 CWE-200 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Liferay Enterprise Portal Web applications / CMS |
Vendor | Liferay |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
Updated 24.10.2022
Added vulnerability #3
EUVDB-ID: #VU68393
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-42114
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: No
DescriptionThe disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in the Role module's edit role assignees page within the "_com_liferay_roles_admin_web_portlet_RolesAdminPortlet_name" parameter. A remote attacker can inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
MitigationInstall updates from vendor's website.
Vulnerable software versionsLiferay Enterprise Portal: 7.4.0 - 7.4.3.36 ga36
CPE2.3 External linksQ & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU68394
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-42115
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: No
DescriptionThe disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in the Object module's edit object details page within the "Label" text field. A remote attacker can inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
MitigationInstall updates from vendor's website.
Vulnerable software versionsLiferay Enterprise Portal: 7.4.3.4 ga4 - 7.4.3.36 ga36
CPE2.3 External linksQ & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU68603
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2022-42127
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to the Friendly Url module does not properly check user permission. A remote attacker can obtain the history of all friendly URLs that was assigned to a page.
MitigationInstall updates from vendor's website.
Vulnerable software versionsLiferay Enterprise Portal: 7.4.3.5 ga5 - 7.4.3.36 ga36
CPE2.3 External linksQ & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?