CVE-2024-25610 (GCVE-0-2024-25610)
Vulnerability from cvelistv5 – Published: 2024-02-20 12:42 – Updated: 2024-08-28 13:37
VLAI?
Summary
In Liferay Portal 7.2.0 through 7.4.3.12, and older unsupported versions, and Liferay DXP 7.4 before update 9, 7.3 before update 4, 7.2 before fix pack 19, and older unsupported versions, the default configuration does not sanitize blog entries of JavaScript, which allows remote authenticated users to inject arbitrary web script or HTML (XSS) via a crafted payload injected into a blog entry’s content text field.
Severity ?
9 (Critical)
CWE
- CWE-1188 - Insecure Default Initialization of Resource
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-01T23:44:09.718Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25610"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:liferay:portal:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "portal",
"vendor": "liferay",
"versions": [
{
"lessThanOrEqual": "7.4.3.12",
"status": "affected",
"version": "7.2.0",
"versionType": "maven"
}
]
},
{
"cpes": [
"cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "digital_experience_platform",
"vendor": "liferay",
"versions": [
{
"lessThanOrEqual": "7.2.10-dxp-18",
"status": "affected",
"version": "7.2.10",
"versionType": "maven"
},
{
"lessThanOrEqual": "7.3.10-dxp-3",
"status": "affected",
"version": "7.3.10",
"versionType": "maven"
},
{
"lessThanOrEqual": "7.4.13.u8",
"status": "affected",
"version": "7.4.13",
"versionType": "maven"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-25610",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-28T13:32:33.811894Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-28T13:37:03.603Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Portal",
"vendor": "Liferay",
"versions": [
{
"lessThanOrEqual": "7.4.3.12",
"status": "affected",
"version": "7.2.0",
"versionType": "maven"
}
]
},
{
"defaultStatus": "unknown",
"product": "DXP",
"vendor": "Liferay",
"versions": [
{
"lessThanOrEqual": "7.4.13.u8",
"status": "affected",
"version": "7.4.13",
"versionType": "maven"
},
{
"lessThanOrEqual": "7.3.10-dxp-3",
"status": "affected",
"version": "7.3.10",
"versionType": "maven"
},
{
"lessThanOrEqual": "7.2.10-dxp-18",
"status": "affected",
"version": "7.2.10",
"versionType": "maven"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "In Liferay Portal 7.2.0 through 7.4.3.12, and older unsupported versions, and Liferay DXP 7.4 before update 9, 7.3 before update 4, 7.2 before fix pack 19, and older unsupported versions, the default configuration does not sanitize blog entries of JavaScript, which allows remote authenticated users to inject arbitrary web script or HTML (XSS) via a crafted payload injected into a blog entry\u2019s content text field."
}
],
"value": "In Liferay Portal 7.2.0 through 7.4.3.12, and older unsupported versions, and Liferay DXP 7.4 before update 9, 7.3 before update 4, 7.2 before fix pack 19, and older unsupported versions, the default configuration does not sanitize blog entries of JavaScript, which allows remote authenticated users to inject arbitrary web script or HTML (XSS) via a crafted payload injected into a blog entry\u2019s content text field."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1188",
"description": "CWE-1188 Insecure Default Initialization of Resource",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-02-20T12:42:46.027Z",
"orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
"shortName": "Liferay"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25610"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3",
"assignerShortName": "Liferay",
"cveId": "CVE-2024-25610",
"datePublished": "2024-02-20T12:42:46.027Z",
"dateReserved": "2024-02-08T13:57:11.426Z",
"dateUpdated": "2024-08-28T13:37:03.603Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"7.2\", \"matchCriteriaId\": \"AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"0DCF7F39-A198-4F7E-84B7-90C88C1BAA96\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7E68DF8-749B-4284-A7C9-929701A86B36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*\", \"matchCriteriaId\": \"340DF1FE-5720-4516-BA51-F2197A654409\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*\", \"matchCriteriaId\": \"97E155DE-05C6-4559-94A8-0EFEB958D0C9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*\", \"matchCriteriaId\": \"0635FB5F-9C90-49C7-A9EF-00C0396FCCAE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*\", \"matchCriteriaId\": \"77523B76-FC26-41B1-A804-7372E13F4FB2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*\", \"matchCriteriaId\": \"B15397B8-5087-4239-AE78-D3C37D59DE83\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_15:*:*:*:*:*:*\", \"matchCriteriaId\": \"311EE92A-0EEF-4556-A52F-E6C9522FA2DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_16:*:*:*:*:*:*\", \"matchCriteriaId\": \"49501C9E-D12A-45E0-92F3-8FD5FDC6D3CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_17:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2B55C77-9FAA-4E14-8CEF-9C4CAC804007\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_18:*:*:*:*:*:*\", \"matchCriteriaId\": \"54E499E6-C747-476B-BFE2-C04D9F8744F3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"7CECAA19-8B7F-44C8-8059-6D4F2105E196\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*\", \"matchCriteriaId\": \"68CBCEEB-7C28-4769-813F-3F01E33D2E08\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*\", \"matchCriteriaId\": \"C0CB4927-A361-4DFA-BDB8-A454EA2894AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2B771B7-D5CB-4778-A3A8-1005E4EE134C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B9DB383-3791-4A43-BA4D-7695B203E736\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*\", \"matchCriteriaId\": \"13F02D77-20E9-4F32-9752-511EB71E6704\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*\", \"matchCriteriaId\": \"6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*\", \"matchCriteriaId\": \"759DDB90-6A89-4E4F-BD04-F70EFA5343B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"43F61E2F-4643-4D5D-84DB-7B7B6E93C67B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B057D81-7589-4007-9A0D-2D302B82F9CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F0F2558-6990-43D7-9FE2-8E99D81B8269\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*\", \"matchCriteriaId\": \"11072673-C3AB-42EA-A26F-890DEE903D42\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*\", \"matchCriteriaId\": \"134560B0-9746-4EC3-8DE3-26E53E2CAC6D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_6:*:*:*:*:*:*\", \"matchCriteriaId\": \"71E41E59-D71F-48F0-812B-39D59F81997B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F6A98ED-E694-4F39-95D0-C152BD1EC115\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CD6861A-D546-462F-8B22-FA76A4AF8A9C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"324BB977-5AAC-4367-98FC-605FF4997B3F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"2BBA40AC-4619-434B-90CF-4D29A1CA6D86\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_3:*:*:*:*:*:*\", \"matchCriteriaId\": \"728DF154-F19F-454C-87CA-1E755107F2A6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"96E84DBC-C740-4E23-8D1D-83C8AE49813E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B1B2384-764F-43CC-8206-36DCBE9DDCBF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.4:update2:*:*:*:*:*:*\", \"matchCriteriaId\": \"10B863B8-201D-494C-8175-168820996174\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.4:update3:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBF766CE-CBB8-472A-BAF0-BD39A7BCB4DE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.4:update4:*:*:*:*:*:*\", \"matchCriteriaId\": \"182FAA46-D9FB-4170-B305-BAD0DF6E5DE9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.4:update5:*:*:*:*:*:*\", \"matchCriteriaId\": \"DF1BB9E6-D690-4C12-AEF0-4BD712869CBA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.4:update6:*:*:*:*:*:*\", \"matchCriteriaId\": \"653A0452-070F-4312-B94A-F5BCB01B9BDC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.4:update7:*:*:*:*:*:*\", \"matchCriteriaId\": \"15B67345-D0AF-4BFD-A62D-870F75306A4F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:digital_experience_platform:7.4:update8:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE1F4262-A054-48CC-BF1D-AA77A94FFFE4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"7.4.3.13\", \"matchCriteriaId\": \"4F2855EC-0F83-4119-95BB-709C414D7E05\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"In Liferay Portal 7.2.0 through 7.4.3.12, and older unsupported versions, and Liferay DXP 7.4 before update 9, 7.3 before update 4, 7.2 before fix pack 19, and older unsupported versions, the default configuration does not sanitize blog entries of JavaScript, which allows remote authenticated users to inject arbitrary web script or HTML (XSS) via a crafted payload injected into a blog entry\\u2019s content text field.\"}, {\"lang\": \"es\", \"value\": \"En Liferay Portal 7.2.0 a 7.4.3.12 y versiones anteriores no compatibles, y Liferay DXP 7.4 antes de la actualizaci\\u00f3n 9, 7.3 antes de la actualizaci\\u00f3n 4, 7.2 antes del fixpack 19 y versiones anteriores no compatibles, la configuraci\\u00f3n predeterminada no sanitiza las entradas del blog de JavaScript , que permite a usuarios remotos autenticados inyectar script web o HTML (XSS) arbitrarios mediante un payload manipulado que se inyecto en el campo de texto de contenido de una entrada de blog.\"}]",
"id": "CVE-2024-25610",
"lastModified": "2024-12-11T17:53:18.093",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"security@liferay.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H\", \"baseScore\": 9.0, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.3, \"impactScore\": 6.0}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\", \"baseScore\": 5.4, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.3, \"impactScore\": 2.7}]}",
"published": "2024-02-20T13:15:08.493",
"references": "[{\"url\": \"https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25610\", \"source\": \"security@liferay.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25610\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "security@liferay.com",
"vulnStatus": "Analyzed",
"weaknesses": "[{\"source\": \"security@liferay.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-1188\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-1188\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-25610\",\"sourceIdentifier\":\"security@liferay.com\",\"published\":\"2024-02-20T13:15:08.493\",\"lastModified\":\"2024-12-11T17:53:18.093\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In Liferay Portal 7.2.0 through 7.4.3.12, and older unsupported versions, and Liferay DXP 7.4 before update 9, 7.3 before update 4, 7.2 before fix pack 19, and older unsupported versions, the default configuration does not sanitize blog entries of JavaScript, which allows remote authenticated users to inject arbitrary web script or HTML (XSS) via a crafted payload injected into a blog entry\u2019s content text field.\"},{\"lang\":\"es\",\"value\":\"En Liferay Portal 7.2.0 a 7.4.3.12 y versiones anteriores no compatibles, y Liferay DXP 7.4 antes de la actualizaci\u00f3n 9, 7.3 antes de la actualizaci\u00f3n 4, 7.2 antes del fixpack 19 y versiones anteriores no compatibles, la configuraci\u00f3n predeterminada no sanitiza las entradas del blog de JavaScript , que permite a usuarios remotos autenticados inyectar script web o HTML (XSS) arbitrarios mediante un payload manipulado que se inyecto en el campo de texto de contenido de una entrada de blog.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@liferay.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H\",\"baseScore\":9.0,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.3,\"impactScore\":6.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.3,\"impactScore\":2.7}]},\"weaknesses\":[{\"source\":\"security@liferay.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1188\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1188\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"7.2\",\"matchCriteriaId\":\"AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DCF7F39-A198-4F7E-84B7-90C88C1BAA96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7E68DF8-749B-4284-A7C9-929701A86B36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*\",\"matchCriteriaId\":\"340DF1FE-5720-4516-BA51-F2197A654409\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*\",\"matchCriteriaId\":\"97E155DE-05C6-4559-94A8-0EFEB958D0C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*\",\"matchCriteriaId\":\"0635FB5F-9C90-49C7-A9EF-00C0396FCCAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*\",\"matchCriteriaId\":\"77523B76-FC26-41B1-A804-7372E13F4FB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*\",\"matchCriteriaId\":\"B15397B8-5087-4239-AE78-D3C37D59DE83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_15:*:*:*:*:*:*\",\"matchCriteriaId\":\"311EE92A-0EEF-4556-A52F-E6C9522FA2DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_16:*:*:*:*:*:*\",\"matchCriteriaId\":\"49501C9E-D12A-45E0-92F3-8FD5FDC6D3CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_17:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2B55C77-9FAA-4E14-8CEF-9C4CAC804007\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_18:*:*:*:*:*:*\",\"matchCriteriaId\":\"54E499E6-C747-476B-BFE2-C04D9F8744F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CECAA19-8B7F-44C8-8059-6D4F2105E196\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"68CBCEEB-7C28-4769-813F-3F01E33D2E08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0CB4927-A361-4DFA-BDB8-A454EA2894AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2B771B7-D5CB-4778-A3A8-1005E4EE134C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B9DB383-3791-4A43-BA4D-7695B203E736\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*\",\"matchCriteriaId\":\"13F02D77-20E9-4F32-9752-511EB71E6704\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*\",\"matchCriteriaId\":\"6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*\",\"matchCriteriaId\":\"759DDB90-6A89-4E4F-BD04-F70EFA5343B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"43F61E2F-4643-4D5D-84DB-7B7B6E93C67B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B057D81-7589-4007-9A0D-2D302B82F9CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F0F2558-6990-43D7-9FE2-8E99D81B8269\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*\",\"matchCriteriaId\":\"11072673-C3AB-42EA-A26F-890DEE903D42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*\",\"matchCriteriaId\":\"134560B0-9746-4EC3-8DE3-26E53E2CAC6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_6:*:*:*:*:*:*\",\"matchCriteriaId\":\"71E41E59-D71F-48F0-812B-39D59F81997B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F6A98ED-E694-4F39-95D0-C152BD1EC115\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CD6861A-D546-462F-8B22-FA76A4AF8A9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"324BB977-5AAC-4367-98FC-605FF4997B3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BBA40AC-4619-434B-90CF-4D29A1CA6D86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"728DF154-F19F-454C-87CA-1E755107F2A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"96E84DBC-C740-4E23-8D1D-83C8AE49813E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B1B2384-764F-43CC-8206-36DCBE9DDCBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.4:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"10B863B8-201D-494C-8175-168820996174\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.4:update3:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBF766CE-CBB8-472A-BAF0-BD39A7BCB4DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.4:update4:*:*:*:*:*:*\",\"matchCriteriaId\":\"182FAA46-D9FB-4170-B305-BAD0DF6E5DE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.4:update5:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF1BB9E6-D690-4C12-AEF0-4BD712869CBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.4:update6:*:*:*:*:*:*\",\"matchCriteriaId\":\"653A0452-070F-4312-B94A-F5BCB01B9BDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.4:update7:*:*:*:*:*:*\",\"matchCriteriaId\":\"15B67345-D0AF-4BFD-A62D-870F75306A4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:digital_experience_platform:7.4:update8:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE1F4262-A054-48CC-BF1D-AA77A94FFFE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"7.4.3.13\",\"matchCriteriaId\":\"4F2855EC-0F83-4119-95BB-709C414D7E05\"}]}]}],\"references\":[{\"url\":\"https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25610\",\"source\":\"security@liferay.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25610\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25610\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T23:44:09.718Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-25610\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-08-28T13:32:33.811894Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:liferay:portal:*:*:*:*:*:*:*:*\"], \"vendor\": \"liferay\", \"product\": \"portal\", \"versions\": [{\"status\": \"affected\", \"version\": \"7.2.0\", \"versionType\": \"maven\", \"lessThanOrEqual\": \"7.4.3.12\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*\"], \"vendor\": \"liferay\", \"product\": \"digital_experience_platform\", \"versions\": [{\"status\": \"affected\", \"version\": \"7.2.10\", \"versionType\": \"maven\", \"lessThanOrEqual\": \"7.2.10-dxp-18\"}, {\"status\": \"affected\", \"version\": \"7.3.10\", \"versionType\": \"maven\", \"lessThanOrEqual\": \"7.3.10-dxp-3\"}, {\"status\": \"affected\", \"version\": \"7.4.13\", \"versionType\": \"maven\", \"lessThanOrEqual\": \"7.4.13.u8\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-08-28T13:36:44.092Z\"}}], \"cna\": {\"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 9, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Liferay\", \"product\": \"Portal\", \"versions\": [{\"status\": \"affected\", \"version\": \"7.2.0\", \"versionType\": \"maven\", \"lessThanOrEqual\": \"7.4.3.12\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Liferay\", \"product\": \"DXP\", \"versions\": [{\"status\": \"affected\", \"version\": \"7.4.13\", \"versionType\": \"maven\", \"lessThanOrEqual\": \"7.4.13.u8\"}, {\"status\": \"affected\", \"version\": \"7.3.10\", \"versionType\": \"maven\", \"lessThanOrEqual\": \"7.3.10-dxp-3\"}, {\"status\": \"affected\", \"version\": \"7.2.10\", \"versionType\": \"maven\", \"lessThanOrEqual\": \"7.2.10-dxp-18\"}], \"defaultStatus\": \"unknown\"}], \"references\": [{\"url\": \"https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25610\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In Liferay Portal 7.2.0 through 7.4.3.12, and older unsupported versions, and Liferay DXP 7.4 before update 9, 7.3 before update 4, 7.2 before fix pack 19, and older unsupported versions, the default configuration does not sanitize blog entries of JavaScript, which allows remote authenticated users to inject arbitrary web script or HTML (XSS) via a crafted payload injected into a blog entry\\u2019s content text field.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"In Liferay Portal 7.2.0 through 7.4.3.12, and older unsupported versions, and Liferay DXP 7.4 before update 9, 7.3 before update 4, 7.2 before fix pack 19, and older unsupported versions, the default configuration does not sanitize blog entries of JavaScript, which allows remote authenticated users to inject arbitrary web script or HTML (XSS) via a crafted payload injected into a blog entry\\u2019s content text field.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-1188\", \"description\": \"CWE-1188 Insecure Default Initialization of Resource\"}]}], \"providerMetadata\": {\"orgId\": \"8b54e794-c6f0-462e-9faa-c1001a673ac3\", \"shortName\": \"Liferay\", \"dateUpdated\": \"2024-02-20T12:42:46.027Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-25610\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-28T13:37:03.603Z\", \"dateReserved\": \"2024-02-08T13:57:11.426Z\", \"assignerOrgId\": \"8b54e794-c6f0-462e-9faa-c1001a673ac3\", \"datePublished\": \"2024-02-20T12:42:46.027Z\", \"assignerShortName\": \"Liferay\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…