Vulnerability Note VU#100972

Liferay Portal PCE contains multiple cross-site scripting vulnerabilities

Original Release date: 09 Jul 2014 | Last revised: 10 Jul 2014

Overview

Liferay Portal versions 6.1.2 CE GA3, 6.1.X EE, 6.2.X EE, Master contain multiple cross-site scripting vulnerabilities

Description

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') - CVE-2014-2963

Liferay is affected by a Persistent Cross Site Scripting vulnerability in the "my account area".
The specific versions affected are: Liferay Portal Community Edition 6.1.2 CE GA3, 6.1.X EE, 6.2.X EE, Master
Three instances of this issue were identified, at the following locations/parameters:

/group/control_panel/manage [_2_firstName parameter]
/group/control_panel/manage [_2_lastName parameter]
/group/control_panel/manage [_2_middleName parameter]

Impact

An attacker with access to the Liferay Portal "my account area" or by tricking a logged in user to visit a specially crafted URL, can conduct a cross-site scripting attack, which could be used to result in information leakage, privilege escalation, and/or denial of service.

Solution

Apply an Update
This vulnerability was addressed on 06/04/14, bug id LPS-46156.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Liferay, Inc.Affected07 May 201409 Jul 2014
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base 3.5 AV:N/AC:M/Au:S/C:N/I:P/A:N
Temporal 2.7 E:POC/RL:OF/RC:ND
Environmental 2.0 CDP:N/TD:M/CR:ND/IR:ND/AR:ND

References

Credit

Thanks to Simone Cecchini from Verizon Enterprise Solutions GCIS Threat and Vulnerability Management for reporting this vulnerability.

This document was written by Chris King.

Other Information

  • CVE IDs: CVE-2014-2963
  • Date Public: 09 Jul 2014
  • Date First Published: 09 Jul 2014
  • Date Last Updated: 10 Jul 2014
  • Document Revision: 10

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.