#VU8548 Improper input validation in Liferay Enterprise Portal


Published: 2017-09-21

Vulnerability identifier: #VU8548

Vulnerability risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: N/A

CWE-ID: CWE-20

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Liferay Enterprise Portal
Web applications / CMS

Vendor: Liferay

Description

The vulnerability allows a remote attacker to perform a denial of service attack.

The vulnerability exists due to insufficient input sanitization when creating or editing Wiki pages. A remote authenticated attacker with permissions to create or edit a Wiki page can cause a denial of service (DoS) in the portal via crafted form parameters.

Mitigation
Install update from vendor's repository:
https://sourceforge.net/projects/liferay-patches/files/7.0.3%20GA4/
https://github.com/community-security-team/liferay-portal/compare/7.0.3-ga4...7.0.3-CST-7029.patch

Vulnerable software versions

Liferay Enterprise Portal: 7.0.0 A1 - 7.0.3 GA4


External links
http://dev.liferay.com/web/community-security-team/known-vulnerabilities/-/asset_publisher/4AHAYapU...


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability