Vulnerability Note VU#750796

Liferay Portal p_p_id parameter vulnerable to persistent cross-site scripting

Original Release date: 05 Jan 2010 | Last revised: 05 Jan 2010

Overview

Liferay Portal is vulnerable to persistent cross-site scripting via the p_p_id parameter, which can allow a remote, unauthenticated attacker to execute arbitrary script in the context of the portal administrator.

Description

Liferay Portal is a web portal that can provide Java applets that adhere to the JSR 168 portlet specification. Liferay is available as a free community-supported version and also a commercial enterprise version. Liferay Portal fails to properly sanitize data that is provided by the p_p_id parameter, which can be provided without authentication as part of an HTTP GET request. The provided data is placed into a database, where it can be displayed to an administrator in another page, such as the Plugins Configuration section of the Control Panel. This allows for persistent cross-site scripting (XSS).

Impact

A remote, unauthenticated attacker may be able to execute arbitrary script in the context of the portal administrator.

Solution

Apply an update

This issue is addressed in Liferay Portal 5.3.0. Please see Liferay issue LPS-6034 for more details.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Liferay, Inc.Affected13 Nov 200905 Jan 2010
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

Thanks to Tomasz Kuczynski for reporting this vulnerability.

This document was written by Will Dormann.

Other Information

  • CVE IDs: CVE-2009-3742
  • Date Public: 05 Jan 2010
  • Date First Published: 05 Jan 2010
  • Date Last Updated: 05 Jan 2010
  • Severity Metric: 8.64
  • Document Revision: 9

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.