Описание
Liferay CMS Portal version 7.1.3 and 7.2.1 have a blind persistent cross-site scripting (XSS) vulnerability in the user name parameter to Calendar. An attacker can insert the malicious payload on the username, lastname or surname fields of its own profile, and the malicious payload will be injected and reflected in the calendar of the user who submitted the payload. An attacker could escalate its privileges in case an admin visits the calendar that injected the payload.
Ссылки
- https://github.com/community-security-team/liferay-portal/compare/7.1.3-ga4...7.1.3-cumulative.patchPatchThird Party Advisory
- https://github.com/community-security-team/liferay-portal/compare/7.2.1-ga2...7.2.1-cumulative.patchPatchThird Party Advisory
- PatchVendor Advisory
- https://github.com/community-security-team/liferay-portal/compare/7.1.3-ga4...7.1.3-cumulative.patchPatchThird Party Advisory
- https://github.com/community-security-team/liferay-portal/compare/7.2.1-ga2...7.2.1-cumulative.patchPatchThird Party Advisory
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:liferay:liferay_portal:7.1.3:*:*:*:*:*:*:*
cpe:2.3:a:liferay:liferay_portal:7.2.1:*:*:*:*:*:*:*
EPSS
Процентиль: 63%
0.0045
Низкий
6.1 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-79
Связанные уязвимости
CVSS3: 6.1
github
больше 3 лет назад
Liferay Portal Vulnerable to Cross-Site Scripting (XSS) via User Name Parameter
EPSS
Процентиль: 63%
0.0045
Низкий
6.1 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-79