High severityNVD Advisory· Published Feb 8, 2024· Updated Oct 2, 2024
CVE-2024-25148
CVE-2024-25148
Description
In Liferay Portal 7.2.0 through 7.4.1, and older unsupported versions, and Liferay DXP 7.3 before service pack 3, 7.2 before fix pack 15, and older unsupported versions the doAsUserId URL parameter may get leaked when creating linked content using the WYSIWYG editor and while impersonating a user. This may allow remote authenticated users to impersonate a user after accessing the linked content.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
com.liferay.portal:release.portal.bomMaven | >= 7.2.0, < 7.4.2 | 7.4.2 |
com.liferay.portal:release.dxp.bomMaven | >= 7.2.0, < 7.2.10.fp15 | 7.2.10.fp15 |
com.liferay.portal:release.dxp.bomMaven | >= 7.3.0, < 7.3.10.u4 | 7.3.10.u4 |
Affected products
2- Liferay/DXPv5Range: 7.3.10
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-qwj8-qgpr-8crmghsaADVISORY
- liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25148ghsavendor-advisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2024-25148ghsaADVISORY
News mentions
0No linked articles in our index yet.