Vulnerability Note VU#750796
Liferay Portal p_p_id parameter vulnerable to persistent cross-site scripting
Liferay Portal is vulnerable to persistent cross-site scripting via the p_p_id parameter, which can allow a remote, unauthenticated attacker to execute arbitrary script in the context of the portal administrator.
Liferay Portal is a web portal that can provide Java applets that adhere to the JSR 168 portlet specification. Liferay is available as a free community-supported version and also a commercial enterprise version. Liferay Portal fails to properly sanitize data that is provided by the p_p_id parameter, which can be provided without authentication as part of an HTTP GET request. The provided data is placed into a database, where it can be displayed to an administrator in another page, such as the Plugins Configuration section of the Control Panel. This allows for persistent cross-site scripting (XSS).
A remote, unauthenticated attacker may be able to execute arbitrary script in the context of the portal administrator.
Apply an update
This issue is addressed in Liferay Portal 5.3.0. Please see Liferay issue LPS-6034 for more details.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Liferay, Inc.||Affected||13 Nov 2009||05 Jan 2010|
CVSS Metrics (Learn More)
Thanks to Tomasz Kuczynski for reporting this vulnerability.
This document was written by Will Dormann.
- CVE IDs: CVE-2009-3742
- Date Public: 05 Jan 2010
- Date First Published: 05 Jan 2010
- Date Last Updated: 05 Jan 2010
- Severity Metric: 8.64
- Document Revision: 9
If you have feedback, comments, or additional information about this vulnerability, please send us email.