CVE-2024-25149 (GCVE-0-2024-25149)
Vulnerability from cvelistv5 – Published: 2024-02-20 07:00 – Updated: 2024-08-01 23:36
VLAI?
Summary
Liferay Portal 7.2.0 through 7.4.1, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 15, and older unsupported versions does not properly restrict membership of a child site when the "Limit membership to members of the parent site" option is enabled, which allows remote authenticated users to add users who are not a member of the parent site to a child site. The added user may obtain permission to perform unauthorized actions in the child site.
Severity ?
5.4 (Medium)
CWE
- CWE-863 - Incorrect Authorization
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-25149",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-02-22T17:46:50.710330Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:35:34.318Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T23:36:21.703Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25149"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Portal",
"vendor": "Liferay",
"versions": [
{
"lessThanOrEqual": "7.4.1",
"status": "affected",
"version": "7.2.0",
"versionType": "maven"
}
]
},
{
"defaultStatus": "unknown",
"product": "DXP",
"vendor": "Liferay",
"versions": [
{
"lessThanOrEqual": "7.3.10-dxp-2",
"status": "affected",
"version": "7.3.10",
"versionType": "maven"
},
{
"lessThanOrEqual": "7.2.10-dxp-14",
"status": "affected",
"version": "7.2.10",
"versionType": "maven"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Liferay Portal 7.2.0 through 7.4.1, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 15, and older unsupported versions does not properly restrict membership of a child site when the \"Limit membership to members of the parent site\" option is enabled, which allows remote authenticated users to add users who are not a member of the parent site to a child site. The added user may obtain permission to perform unauthorized actions in the child site."
}
],
"value": "Liferay Portal 7.2.0 through 7.4.1, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 15, and older unsupported versions does not properly restrict membership of a child site when the \"Limit membership to members of the parent site\" option is enabled, which allows remote authenticated users to add users who are not a member of the parent site to a child site. The added user may obtain permission to perform unauthorized actions in the child site."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-863",
"description": "CWE-863 Incorrect Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-02-20T07:00:19.650Z",
"orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
"shortName": "Liferay"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25149"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
"assignerShortName": "Liferay",
"cveId": "CVE-2024-25149",
"datePublished": "2024-02-20T07:00:19.650Z",
"dateReserved": "2024-02-06T10:32:42.567Z",
"dateUpdated": "2024-08-01T23:36:21.703Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"7.2\", \"matchCriteriaId\": \"AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"0DCF7F39-A198-4F7E-84B7-90C88C1BAA96\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7E68DF8-749B-4284-A7C9-929701A86B36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*\", \"matchCriteriaId\": \"340DF1FE-5720-4516-BA51-F2197A654409\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*\", \"matchCriteriaId\": \"97E155DE-05C6-4559-94A8-0EFEB958D0C9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*\", \"matchCriteriaId\": \"0635FB5F-9C90-49C7-A9EF-00C0396FCCAE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*\", \"matchCriteriaId\": \"77523B76-FC26-41B1-A804-7372E13F4FB2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*\", \"matchCriteriaId\": \"B15397B8-5087-4239-AE78-D3C37D59DE83\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"7CECAA19-8B7F-44C8-8059-6D4F2105E196\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*\", \"matchCriteriaId\": \"68CBCEEB-7C28-4769-813F-3F01E33D2E08\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*\", \"matchCriteriaId\": \"C0CB4927-A361-4DFA-BDB8-A454EA2894AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2B771B7-D5CB-4778-A3A8-1005E4EE134C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B9DB383-3791-4A43-BA4D-7695B203E736\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*\", \"matchCriteriaId\": \"13F02D77-20E9-4F32-9752-511EB71E6704\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*\", \"matchCriteriaId\": \"6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*\", \"matchCriteriaId\": \"759DDB90-6A89-4E4F-BD04-F70EFA5343B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"43F61E2F-4643-4D5D-84DB-7B7B6E93C67B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B057D81-7589-4007-9A0D-2D302B82F9CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F0F2558-6990-43D7-9FE2-8E99D81B8269\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*\", \"matchCriteriaId\": \"11072673-C3AB-42EA-A26F-890DEE903D42\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*\", \"matchCriteriaId\": \"134560B0-9746-4EC3-8DE3-26E53E2CAC6D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F6A98ED-E694-4F39-95D0-C152BD1EC115\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CD6861A-D546-462F-8B22-FA76A4AF8A9C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"324BB977-5AAC-4367-98FC-605FF4997B3F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"2BBA40AC-4619-434B-90CF-4D29A1CA6D86\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"7.4.2\", \"matchCriteriaId\": \"69440C19-B9E7-41F3-B731-B5C7E37C718A\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Liferay Portal 7.2.0 through 7.4.1, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 15, and older unsupported versions does not properly restrict membership of a child site when the \\\"Limit membership to members of the parent site\\\" option is enabled, which allows remote authenticated users to add users who are not a member of the parent site to a child site. The added user may obtain permission to perform unauthorized actions in the child site.\"}, {\"lang\": \"es\", \"value\": \"Liferay Portal 7.2.0 a 7.4.1 y versiones anteriores no compatibles, y Liferay DXP 7.3 anterior al service pack 3, 7.2 anterior al fix pack 15 y versiones anteriores no compatibles no restringen adecuadamente la membres\\u00eda de un sitio secundario cuando la opci\\u00f3n \\\"Limitar membres\\u00eda a miembros del sitio principal\\\" est\\u00e1 habilitada, lo que permite a los usuarios autenticados remotamente agregar usuarios que no son miembros del sitio principal a un sitio secundario. El usuario agregado puede obtener permiso para realizar acciones no autorizadas en el sitio secundario.\"}]",
"id": "CVE-2024-25149",
"lastModified": "2024-12-10T23:03:54.853",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"security@liferay.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N\", \"baseScore\": 5.4, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 2.5}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N\", \"baseScore\": 5.4, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 2.5}]}",
"published": "2024-02-20T07:15:10.557",
"references": "[{\"url\": \"https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25149\", \"source\": \"security@liferay.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25149\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "security@liferay.com",
"vulnStatus": "Analyzed",
"weaknesses": "[{\"source\": \"security@liferay.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-863\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-863\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-25149\",\"sourceIdentifier\":\"security@liferay.com\",\"published\":\"2024-02-20T07:15:10.557\",\"lastModified\":\"2024-12-10T23:03:54.853\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Liferay Portal 7.2.0 through 7.4.1, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 15, and older unsupported versions does not properly restrict membership of a child site when the \\\"Limit membership to members of the parent site\\\" option is enabled, which allows remote authenticated users to add users who are not a member of the parent site to a child site. The added user may obtain permission to perform unauthorized actions in the child site.\"},{\"lang\":\"es\",\"value\":\"Liferay Portal 7.2.0 a 7.4.1 y versiones anteriores no compatibles, y Liferay DXP 7.3 anterior al service pack 3, 7.2 anterior al fix pack 15 y versiones anteriores no compatibles no restringen adecuadamente la membres\u00eda de un sitio secundario cuando la opci\u00f3n \\\"Limitar membres\u00eda a miembros del sitio principal\\\" est\u00e1 habilitada, lo que permite a los usuarios autenticados remotamente agregar usuarios que no son miembros del sitio principal a un sitio secundario. El usuario agregado puede obtener permiso para realizar acciones no autorizadas en el sitio secundario.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@liferay.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.5},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.5}]},\"weaknesses\":[{\"source\":\"security@liferay.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-863\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-863\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"7.2\",\"matchCriteriaId\":\"AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DCF7F39-A198-4F7E-84B7-90C88C1BAA96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7E68DF8-749B-4284-A7C9-929701A86B36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*\",\"matchCriteriaId\":\"340DF1FE-5720-4516-BA51-F2197A654409\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*\",\"matchCriteriaId\":\"97E155DE-05C6-4559-94A8-0EFEB958D0C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*\",\"matchCriteriaId\":\"0635FB5F-9C90-49C7-A9EF-00C0396FCCAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*\",\"matchCriteriaId\":\"77523B76-FC26-41B1-A804-7372E13F4FB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*\",\"matchCriteriaId\":\"B15397B8-5087-4239-AE78-D3C37D59DE83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CECAA19-8B7F-44C8-8059-6D4F2105E196\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"68CBCEEB-7C28-4769-813F-3F01E33D2E08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0CB4927-A361-4DFA-BDB8-A454EA2894AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2B771B7-D5CB-4778-A3A8-1005E4EE134C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B9DB383-3791-4A43-BA4D-7695B203E736\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*\",\"matchCriteriaId\":\"13F02D77-20E9-4F32-9752-511EB71E6704\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*\",\"matchCriteriaId\":\"6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*\",\"matchCriteriaId\":\"759DDB90-6A89-4E4F-BD04-F70EFA5343B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"43F61E2F-4643-4D5D-84DB-7B7B6E93C67B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B057D81-7589-4007-9A0D-2D302B82F9CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F0F2558-6990-43D7-9FE2-8E99D81B8269\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*\",\"matchCriteriaId\":\"11072673-C3AB-42EA-A26F-890DEE903D42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*\",\"matchCriteriaId\":\"134560B0-9746-4EC3-8DE3-26E53E2CAC6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F6A98ED-E694-4F39-95D0-C152BD1EC115\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CD6861A-D546-462F-8B22-FA76A4AF8A9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"324BB977-5AAC-4367-98FC-605FF4997B3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BBA40AC-4619-434B-90CF-4D29A1CA6D86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"7.4.2\",\"matchCriteriaId\":\"69440C19-B9E7-41F3-B731-B5C7E37C718A\"}]}]}],\"references\":[{\"url\":\"https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25149\",\"source\":\"security@liferay.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25149\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25149\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T23:36:21.703Z\"}}, {\"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-25149\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-02-22T17:46:50.710330Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-05-23T19:01:12.980Z\"}, \"title\": \"CISA ADP Vulnrichment\"}], \"cna\": {\"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.4, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"LOW\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Liferay\", \"product\": \"Portal\", \"versions\": [{\"status\": \"affected\", \"version\": \"7.2.0\", \"versionType\": \"maven\", \"lessThanOrEqual\": \"7.4.1\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Liferay\", \"product\": \"DXP\", \"versions\": [{\"status\": \"affected\", \"version\": \"7.3.10\", \"versionType\": \"maven\", \"lessThanOrEqual\": \"7.3.10-dxp-2\"}, {\"status\": \"affected\", \"version\": \"7.2.10\", \"versionType\": \"maven\", \"lessThanOrEqual\": \"7.2.10-dxp-14\"}], \"defaultStatus\": \"unknown\"}], \"references\": [{\"url\": \"https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25149\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Liferay Portal 7.2.0 through 7.4.1, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 15, and older unsupported versions does not properly restrict membership of a child site when the \\\"Limit membership to members of the parent site\\\" option is enabled, which allows remote authenticated users to add users who are not a member of the parent site to a child site. The added user may obtain permission to perform unauthorized actions in the child site.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Liferay Portal 7.2.0 through 7.4.1, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 15, and older unsupported versions does not properly restrict membership of a child site when the \\\"Limit membership to members of the parent site\\\" option is enabled, which allows remote authenticated users to add users who are not a member of the parent site to a child site. The added user may obtain permission to perform unauthorized actions in the child site.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-863\", \"description\": \"CWE-863 Incorrect Authorization\"}]}], \"providerMetadata\": {\"orgId\": \"8b54e794-c6f0-462e-9faa-c1001a673ac3\", \"shortName\": \"Liferay\", \"dateUpdated\": \"2024-02-20T07:00:19.650Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-25149\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-01T23:36:21.703Z\", \"dateReserved\": \"2024-02-06T10:32:42.567Z\", \"assignerOrgId\": \"8b54e794-c6f0-462e-9faa-c1001a673ac3\", \"datePublished\": \"2024-02-20T07:00:19.650Z\", \"assignerShortName\": \"Liferay\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…