CVE-2023-44311 (GCVE-0-2023-44311)

Vulnerability from cvelistv5 – Published: 2023-10-17 09:39 – Updated: 2024-09-13 16:28
VLAI?
Summary
Multiple reflected cross-site scripting (XSS) vulnerabilities in the Plugin for OAuth 2.0 module's OAuth2ProviderApplicationRedirect class in Liferay Portal 7.4.3.41 through 7.4.3.89, and Liferay DXP 7.4 update 41 through update 89 allow remote attackers to inject arbitrary web script or HTML via the (1) code, or (2) error parameter. This issue is caused by an incomplete fix in CVE-2023-33941.
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
References
Impacted products
Vendor Product Version
Liferay DXP Affected: 7.4.13.u41 , ≤ 7.4.13.u89 (maven)
Create a notification for this product.
    Liferay Portal Affected: 7.4.3.41 , ≤ 7.4.3.89 (maven)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T19:59:51.988Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-44311"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-44311",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-13T16:28:36.237243Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-13T16:28:45.098Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "DXP",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.13.u89",
              "status": "affected",
              "version": "7.4.13.u41",
              "versionType": "maven"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Portal",
          "vendor": "Liferay",
          "versions": [
            {
              "lessThanOrEqual": "7.4.3.89",
              "status": "affected",
              "version": "7.4.3.41",
              "versionType": "maven"
            }
          ]
        }
      ],
      "datePublic": "2023-10-17T07:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Multiple reflected cross-site scripting (XSS) vulnerabilities in the Plugin for OAuth 2.0 module\u0027s OAuth2ProviderApplicationRedirect class in Liferay Portal 7.4.3.41 through 7.4.3.89, and Liferay DXP 7.4 update 41 through update 89 allow remote attackers to inject arbitrary web script or HTML via the (1) code, or (2) error parameter. This issue is caused by an incomplete fix in CVE-2023-33941."
            }
          ],
          "value": "Multiple reflected cross-site scripting (XSS) vulnerabilities in the Plugin for OAuth 2.0 module\u0027s OAuth2ProviderApplicationRedirect class in Liferay Portal 7.4.3.41 through 7.4.3.89, and Liferay DXP 7.4 update 41 through update 89 allow remote attackers to inject arbitrary web script or HTML via the (1) code, or (2) error parameter. This issue is caused by an incomplete fix in CVE-2023-33941."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.6,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-17T09:39:07.508Z",
        "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
        "shortName": "Liferay"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-44311"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
    "assignerShortName": "Liferay",
    "cveId": "CVE-2023-44311",
    "datePublished": "2023-10-17T09:39:07.508Z",
    "dateReserved": "2023-09-28T11:23:54.829Z",
    "dateUpdated": "2024-09-13T16:28:45.098Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.4:update41:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B256485-E289-4092-B45B-835DE12625B9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.4:update48:*:*:*:*:*:*\", \"matchCriteriaId\": \"67F50AF8-7B0E-4D01-9EB2-C6625E9DACB6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*\", \"matchCriteriaId\": \"CCD1DEA0-8823-4780-B5EE-C1A2BB3C6B4F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC6FF5AB-B6E4-45D9-854B-29DEC200DA4D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.4:update62:*:*:*:*:*:*\", \"matchCriteriaId\": \"365F28B6-DBF2-45BB-A06D-DD80CFBAD7BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.4:update67:*:*:*:*:*:*\", \"matchCriteriaId\": \"960F3F22-9CC8-4655-9B09-777E5A5A1239\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.4:update76:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E325115-EEBC-41F4-8606-45270DA40B98\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*\", \"matchCriteriaId\": \"294D8A56-A797-433C-A06E-106B2179151A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*\", \"matchCriteriaId\": \"824D88D9-4645-4CAD-8CAB-30F27DD388C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6E8C952-B455-46E4-AC3D-D38CAF189F60\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD77C0EE-AC79-4443-A502-C1E02F806911\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*\", \"matchCriteriaId\": \"648EB53C-7A90-4DA6-BF1C-B5336CDE30C7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.4:update86:*:*:*:*:*:*\", \"matchCriteriaId\": \"39835EF7-8E93-4695-973D-6E9B76C67372\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"7.4.3.41\", \"versionEndExcluding\": \"7.4.3.90\", \"matchCriteriaId\": \"6204FB7B-6129-4E68-A811-6B51961C3D4A\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Multiple reflected cross-site scripting (XSS) vulnerabilities in the Plugin for OAuth 2.0 module\u0027s OAuth2ProviderApplicationRedirect class in Liferay Portal 7.4.3.41 through 7.4.3.89, and Liferay DXP 7.4 update 41 through update 89 allow remote attackers to inject arbitrary web script or HTML via the (1) code, or (2) error parameter. This issue is caused by an incomplete fix in CVE-2023-33941.\"}, {\"lang\": \"es\", \"value\": \"M\\u00faltiples vulnerabilidades de Cross-Site Scripting (XSS) reflejadas en el complemento para la clase OAuth2ProviderApplicationRedirect del m\\u00f3dulo OAuth 2.0 en Liferay Portal v7.4.3.41 a 7.4.3.89 y Liferay DXP 7.4 actualizaci\\u00f3n 41 a 89 permiten a atacantes remotos inyectar script  web o HTML arbitrarios mediante el (1) c\\u00f3digo o (2) el par\\u00e1metro de error. Este problema se debe a una soluci\\u00f3n incompleta en CVE-2023-33941.\"}]",
      "id": "CVE-2023-44311",
      "lastModified": "2024-11-21T08:25:38.623",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"security@liferay.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H\", \"baseScore\": 9.6, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 6.0}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\", \"baseScore\": 6.1, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 2.7}]}",
      "published": "2023-10-17T10:15:09.947",
      "references": "[{\"url\": \"https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-44311\", \"source\": \"security@liferay.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-44311\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "security@liferay.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"security@liferay.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-44311\",\"sourceIdentifier\":\"security@liferay.com\",\"published\":\"2023-10-17T10:15:09.947\",\"lastModified\":\"2024-11-21T08:25:38.623\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple reflected cross-site scripting (XSS) vulnerabilities in the Plugin for OAuth 2.0 module\u0027s OAuth2ProviderApplicationRedirect class in Liferay Portal 7.4.3.41 through 7.4.3.89, and Liferay DXP 7.4 update 41 through update 89 allow remote attackers to inject arbitrary web script or HTML via the (1) code, or (2) error parameter. This issue is caused by an incomplete fix in CVE-2023-33941.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples vulnerabilidades de Cross-Site Scripting (XSS) reflejadas en el complemento para la clase OAuth2ProviderApplicationRedirect del m\u00f3dulo OAuth 2.0 en Liferay Portal v7.4.3.41 a 7.4.3.89 y Liferay DXP 7.4 actualizaci\u00f3n 41 a 89 permiten a atacantes remotos inyectar script  web o HTML arbitrarios mediante el (1) c\u00f3digo o (2) el par\u00e1metro de error. Este problema se debe a una soluci\u00f3n incompleta en CVE-2023-33941.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@liferay.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H\",\"baseScore\":9.6,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":6.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}]},\"weaknesses\":[{\"source\":\"security@liferay.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.4:update41:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B256485-E289-4092-B45B-835DE12625B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.4:update48:*:*:*:*:*:*\",\"matchCriteriaId\":\"67F50AF8-7B0E-4D01-9EB2-C6625E9DACB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.4:update50:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCD1DEA0-8823-4780-B5EE-C1A2BB3C6B4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.4:update52:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC6FF5AB-B6E4-45D9-854B-29DEC200DA4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.4:update62:*:*:*:*:*:*\",\"matchCriteriaId\":\"365F28B6-DBF2-45BB-A06D-DD80CFBAD7BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.4:update67:*:*:*:*:*:*\",\"matchCriteriaId\":\"960F3F22-9CC8-4655-9B09-777E5A5A1239\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.4:update76:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E325115-EEBC-41F4-8606-45270DA40B98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.4:update81:*:*:*:*:*:*\",\"matchCriteriaId\":\"294D8A56-A797-433C-A06E-106B2179151A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.4:update82:*:*:*:*:*:*\",\"matchCriteriaId\":\"824D88D9-4645-4CAD-8CAB-30F27DD388C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.4:update83:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6E8C952-B455-46E4-AC3D-D38CAF189F60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.4:update84:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD77C0EE-AC79-4443-A502-C1E02F806911\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.4:update85:*:*:*:*:*:*\",\"matchCriteriaId\":\"648EB53C-7A90-4DA6-BF1C-B5336CDE30C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.4:update86:*:*:*:*:*:*\",\"matchCriteriaId\":\"39835EF7-8E93-4695-973D-6E9B76C67372\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.4.3.41\",\"versionEndExcluding\":\"7.4.3.90\",\"matchCriteriaId\":\"6204FB7B-6129-4E68-A811-6B51961C3D4A\"}]}]}],\"references\":[{\"url\":\"https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-44311\",\"source\":\"security@liferay.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-44311\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-44311\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T19:59:51.988Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-44311\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-13T16:28:36.237243Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-13T16:28:40.581Z\"}}], \"cna\": {\"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 9.6, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Liferay\", \"product\": \"DXP\", \"versions\": [{\"status\": \"affected\", \"version\": \"7.4.13.u41\", \"versionType\": \"maven\", \"lessThanOrEqual\": \"7.4.13.u89\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Liferay\", \"product\": \"Portal\", \"versions\": [{\"status\": \"affected\", \"version\": \"7.4.3.41\", \"versionType\": \"maven\", \"lessThanOrEqual\": \"7.4.3.89\"}], \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2023-10-17T07:00:00.000Z\", \"references\": [{\"url\": \"https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2023-44311\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Multiple reflected cross-site scripting (XSS) vulnerabilities in the Plugin for OAuth 2.0 module\u0027s OAuth2ProviderApplicationRedirect class in Liferay Portal 7.4.3.41 through 7.4.3.89, and Liferay DXP 7.4 update 41 through update 89 allow remote attackers to inject arbitrary web script or HTML via the (1) code, or (2) error parameter. This issue is caused by an incomplete fix in CVE-2023-33941.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Multiple reflected cross-site scripting (XSS) vulnerabilities in the Plugin for OAuth 2.0 module\u0027s OAuth2ProviderApplicationRedirect class in Liferay Portal 7.4.3.41 through 7.4.3.89, and Liferay DXP 7.4 update 41 through update 89 allow remote attackers to inject arbitrary web script or HTML via the (1) code, or (2) error parameter. This issue is caused by an incomplete fix in CVE-2023-33941.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-79\", \"description\": \"CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"8b54e794-c6f0-462e-9faa-c1001a673ac3\", \"shortName\": \"Liferay\", \"dateUpdated\": \"2023-10-17T09:39:07.508Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2023-44311\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-09-13T16:28:45.098Z\", \"dateReserved\": \"2023-09-28T11:23:54.829Z\", \"assignerOrgId\": \"8b54e794-c6f0-462e-9faa-c1001a673ac3\", \"datePublished\": \"2023-10-17T09:39:07.508Z\", \"assignerShortName\": \"Liferay\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…