Summary
This host is running Liferay Portal and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow remote attackers to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, steal cookie based authentication credentials, disclose or modify sensitive information, perform unauthorized actions in the context of a user's session.
Impact Level: Application
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
Insight
Multiple flaws are due to
- Input passed to the 'uploadProgressId' parameter in html/portal/upload_ progress_poller.jsp is not properly sanitised before being returned to the user.
- Input passed to the 'ckEditorConfigFileName' parameter when editing articles in a journal is not properly sanitised before being returned to the user.
- Input passed to the '_16_chartId' parameter when viewing the currency converter is not properly sanitised before being returned to the user.
- Input passed to the 'tag' parameter when viewing blog categories is not properly sanitised before being returned to the user.
- The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to disclose potentially sensitive information.
Affected
Liferay Portal version 6.1.10 and prior
References
Severity
Classification
-
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:P/A:N
Related Vulnerabilities
- A4Desk Event Calendar 'eventid' Parameter SQL Injection Vulnerability
- Andromeda Streaming MP3 Server Cross Site Scripting Vulnerability
- Apache mod_proxy_ajp Information Disclosure Vulnerability
- AjaXplorer 'doc_file' Parameter Local File Disclosure Vulnerability
- A Really Simple Chat Multiple XSS Vulnerabilities