Liferay Portal is vulnerable to persistent cross-site scripting via the p_p_id parameter, which can allow a remote, unauthenticated attacker to execute arbitrary script in the context of the portal administrator.
Liferay Portal is a web portal that can provide Java applets that adhere to the JSR 168 portlet specification. Liferay is available as a free community-supported version and also a commercial enterprise version. Liferay Portal fails to properly sanitize data that is provided by the p_p_id parameter, which can be provided without authentication as part of an HTTP GET request. The provided data is placed into a database, where it can be displayed to an administrator in another page, such as the Plugins Configuration section of the Control Panel. This allows for persistent cross-site scripting (XSS).
A remote, unauthenticated attacker may be able to execute arbitrary script in the context of the portal administrator.
Apply an update
This issue is addressed in Liferay Portal 5.3.0. Please see Liferay issue LPS-6034 for more details.
Vendor| Status| Date Notified| Date Updated
Liferay, Inc.| | 13 Nov 2009| 05 Jan 2010
If you are a vendor and your product is affected, let us know.
Group | Score | Vector
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | N/A | N/A
Thanks to Tomasz Kuczynski for reporting this vulnerability.
This document was written by Will Dormann.