9 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
6.8 Medium
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
9.0%
The version of Liferay Portal installed on the remote host is prior to 7.4.3.4. It is, therefore, affected by multiple vulnerabilities as referenced in the advisory.
The Calendar module in Liferay Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 15, and older unsupported versions does not escape user supplied data in the default notification email template, which allows remote authenticated users to inject arbitrary web script or HTML via the title of a calendar event or the user’s name. This may lead to a content spoofing or cross-site scripting (XSS) attacks depending on the capability of the receiver’s mail client. (CVE-2024-25151)
Stored cross-site scripting (XSS) vulnerability in Message Board widget in Liferay Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 17, and older unsupported versions allows remote authenticated users to inject arbitrary web script or HTML via the filename of an attachment. (CVE-2024-25152)
Stored cross-site scripting (XSS) vulnerability in Expando module’s geolocation custom fields in Liferay Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 17, and older unsupported versions allows remote authenticated users to inject arbitrary web script or HTML via a crafted payload injected into the name text field of a geolocation custom field.
(CVE-2024-25601)
Stored cross-site scripting (XSS) vulnerability in Users Admin module’s edit user page in Liferay Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 17, and older unsupported versions allows remote authenticated users to inject arbitrary web script or HTML via a crafted payload injected into an organization’s Name text field (CVE-2024-25602)
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##
include('compat.inc');
if (description)
{
script_id(190930);
script_version("1.1");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/06/05");
script_cve_id(
"CVE-2024-25151",
"CVE-2024-25152",
"CVE-2024-25601",
"CVE-2024-25602"
);
script_xref(name:"IAVA", value:"2024-A-0115");
script_name(english:"Liferay Portal 7.4.x < 7.4.3.4 Multiple Vulnerabilities");
script_set_attribute(attribute:"synopsis", value:
"The remote host is missing one or more security updates.");
script_set_attribute(attribute:"description", value:
"The version of Liferay Portal installed on the remote host is prior to 7.4.3.4. It is, therefore, affected by multiple
vulnerabilities as referenced in the advisory.
- The Calendar module in Liferay Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP
7.3 before service pack 3, 7.2 before fix pack 15, and older unsupported versions does not escape user
supplied data in the default notification email template, which allows remote authenticated users to
inject arbitrary web script or HTML via the title of a calendar event or the user's name. This may lead to
a content spoofing or cross-site scripting (XSS) attacks depending on the capability of the receiver's
mail client. (CVE-2024-25151)
- Stored cross-site scripting (XSS) vulnerability in Message Board widget in Liferay Portal 7.2.0 through
7.4.2, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 17,
and older unsupported versions allows remote authenticated users to inject arbitrary web script or HTML
via the filename of an attachment. (CVE-2024-25152)
- Stored cross-site scripting (XSS) vulnerability in Expando module's geolocation custom fields in Liferay
Portal 7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2
before fix pack 17, and older unsupported versions allows remote authenticated users to inject arbitrary
web script or HTML via a crafted payload injected into the name text field of a geolocation custom field.
(CVE-2024-25601)
- Stored cross-site scripting (XSS) vulnerability in Users Admin module's edit user page in Liferay Portal
7.2.0 through 7.4.2, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before
fix pack 17, and older unsupported versions allows remote authenticated users to inject arbitrary web
script or HTML via a crafted payload injected into an organization's Name text field (CVE-2024-25602)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://liferay.dev/portal/security/known-vulnerabilities");
script_set_attribute(attribute:"solution", value:
"Upgrade Liferay Portal based upon the guidance specified in the advisory.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2024-25602");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2024/02/21");
script_set_attribute(attribute:"patch_publication_date", value:"2024/02/21");
script_set_attribute(attribute:"plugin_publication_date", value:"2024/02/23");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/a:liferay:liferay_portal");
script_set_attribute(attribute:"stig_severity", value:"I");
script_set_attribute(attribute:"thorough_tests", value:"true");
script_set_attribute(attribute:"enable_cgi_scanning", value:"true");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"CGI abuses");
script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("liferay_detect.nasl");
script_require_keys("installed_sw/liferay_portal");
script_exclude_keys("Settings/disable_cgi_scanning");
exit(0);
}
include('vcf.inc');
var app_info = vcf::combined_get_app_info(app:'liferay_portal');
var constraints = [
{ 'min_version' : '7.4.0', 'max_version' : '7.4.2', 'fixed_version' : '7.4.3.4' }
];
vcf::check_version_and_report(
app_info:app_info,
constraints:constraints,
severity:SECURITY_HOLE,
flags:{'xss':TRUE}
);
Vendor | Product | Version | CPE |
---|---|---|---|
liferay | liferay_portal | cpe:/a:liferay:liferay_portal |
9 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
6.8 Medium
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
9.0%