Описание
The XSL Content portlet in Liferay Portal Community Edition (CE) 5.x and 6.x before 6.0.6 GA, when Apache Tomcat or Oracle GlassFish is used, allows remote authenticated users to read arbitrary (1) XSL and (2) XML files via a file:/// URL.
The XSL Content portlet in Liferay Portal Community Edition (CE) 5.x and 6.x before 6.0.6 GA, when Apache Tomcat or Oracle GlassFish is used, allows remote authenticated users to read arbitrary (1) XSL and (2) XML files via a file:/// URL.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2011-1503
- http://issues.liferay.com/browse/LPS-13762
- http://issues.liferay.com/secure/ReleaseNote.jspa?version=10656&styleName=Html&projectId=10952
- http://openwall.com/lists/oss-security/2011/03/29/1
- http://openwall.com/lists/oss-security/2011/04/08/5
- http://openwall.com/lists/oss-security/2011/04/11/9
Связанные уязвимости
The XSL Content portlet in Liferay Portal Community Edition (CE) 5.x and 6.x before 6.0.6 GA, when Apache Tomcat or Oracle GlassFish is used, allows remote authenticated users to read arbitrary (1) XSL and (2) XML files via a file:/// URL.
The XSL Content portlet in Liferay Portal Community Edition (CE) 5.x a ...