CVE-2020-7961

critical
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Deserialization of Untrusted Data in Liferay Portal prior to 7.2.1 CE GA2 allows remote attackers to execute arbitrary code via JSON web services (JSONWS).

References

http://packetstormsecurity.com/files/157254/Liferay-Portal-Java-Unmarshalling-Remote-Code-Execution.html

http://packetstormsecurity.com/files/158392/Liferay-Portal-Remote-Code-Execution.html

https://portal.liferay.dev/learn/security/known-vulnerabilities

https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/117954271

https://research.checkpoint.com/2021/freakout-leveraging-newest-vulnerabilities-for-creating-a-botnet/

Details

Source: MITRE

Published: 2020-03-20

Updated: 2021-01-30

Type: CWE-502

Risk Information

CVSS v2

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 10

Severity: HIGH

CVSS v3

Base Score: 9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 3.9

Severity: CRITICAL

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:liferay:liferay_portal:*:*:*:*:community:*:*:* versions up to 7.2.0 (inclusive)

Tenable Plugins

View all (3 total)

IDNameProductFamilySeverity
155678Liferay Portal 6.2.x < 6.2.5 / 7.0.x < 7.0.6 / 7.1.x < 7.1.3 / 7.2.x < 7.2.1 RCENessusCGI abuses
critical
146861Liferay Portal Remote Code Execution (direct check)NessusWeb Servers
critical
112382Liferay Portal < 6.2.5 / 7.0.x < 7.0.6 / 7.1.x < 7.1.3 / 7.2.0 Remote Code ExecutionWeb Application ScanningComponent Vulnerability
critical