Lucene search

K
githubGitHub Advisory DatabaseGHSA-VJJ4-QWCM-552H
HistoryNov 15, 2022 - 12:00 p.m.

Inefficient Regular Expression Complexity in Liferay Portal

2022-11-1512:00:16
CWE-1333
GitHub Advisory Database
github.com
9
liferay portal
redos vulnerability
layoutpagetemplateentryupgradeprocess
remote attackers
server resources

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.005

Percentile

75.9%

ReDoS vulnerability in LayoutPageTemplateEntryUpgradeProcess in Liferay Portal 7.3.2 through 7.4.3.4 and Liferay DXP 7.2 fix pack 9 through fix pack 18, 7.3 before update 4, and DXP 7.4 GA allows remote attackers to consume an excessive amount of server resources via a crafted payload injected into the ‘name’ field of a layout prototype.

Affected configurations

Vulners
Node
com.liferay.portal\Matchrelease.portal.bom
VendorProductVersionCPE
*com.liferay.portal\release.portal.bomcpe:2.3:a:*:com.liferay.portal\:release.portal.bom:*:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.005

Percentile

75.9%

Related for GHSA-VJJ4-QWCM-552H