Lucene search

K
githubGitHub Advisory DatabaseGHSA-V2XQ-M22W-JMPR
HistoryFeb 21, 2024 - 3:30 a.m.

Liferay Portal and Liferay DXP's Users Admin module vulnerable to stored Cross-site Scripting

2024-02-2103:30:37
CWE-79
GitHub Advisory Database
github.com
5
liferay portal
liferay dxp
users admin module
xss vulnerability
remote authenticated users
crafted payload
html injection

9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

5.1 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Stored cross-site scripting (XSS) vulnerability in Users Admin module’s edit user page in Liferay Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 17, and older unsupported versions allows remote authenticated users to inject arbitrary web script or HTML via a crafted payload injected into an organization’s β€œName” text field

Affected configurations

Vulners
Node
com.liferay.portal\Matchrelease.dxp.bom
OR
com.liferay.portal\Matchrelease.dxp.bom
OR
com.liferay.portal\Matchrelease.portal.bom

9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

5.1 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for GHSA-V2XQ-M22W-JMPR