Liferay Portal contains a cross-site scripting vulnerability in the handling of the User-Agent HTTP header, which can allow a remote, authenticated attacker to gain administrative access.
Liferay Portal is an enterprise portal solution that uses Java technologies. The Enterprise Admin Session Monitoring part of Liferay Portal fails to properly sanitize the User-Agent field supplied in HTTP headers.
A remote, authenticated attacker may be able to execute arbitrary script within the context of the portal administrator.
Apply an update
This issue is addressed in Liferay versions 4.4.0 and 4.3.7, as specified in Liferay support document LEP-4736.
Thanks to Tomasz Kuczynski for reporting this vulnerability.
This document was written by Will Dormann.
|Date First Published:||2008-01-31|
|Date Last Updated:||2008-01-31 19:21 UTC|