Liferay Portal < 6.0.6 Multiple Vulnerabilities

high Nessus Plugin ID 59230

Synopsis

The remote web server contains a Java application that is affected by multiple vulnerabilities.

Description

According to its self-reported version number, the installation of Liferay Portal hosted on the remote web server is affected by multiple vulnerabilities :

- An arbitrary file download vulnerability exists when Apache Tomcat is used, which allows remote, authenticated users to download arbitrary files via an entity declaration in conjunction with an entity reference, related to an XML External Entity (aka XXE) issue. (CVE-2011-1502)

- An arbitrary file download vulnerability exists when Apache Tomcat or Oracle GlassFish is used. The XSL Content portlet allows remote, authenticated users to read arbitrary XSL / XML files via a file:/// URL.
(CVE-2011-1503)

- A cross-site scripting vulnerability exists, which allows remote, authenticated users to inject arbitrary JavaScript or HTML via a blog title. (CVE-2011-1504)

- A cross-site scripting vulnerability exists when Apache Tomcat is used, which allows remote, authenticated users to inject arbitrary JavaScript or HTML via a message title. (CVE-2011-1570)

- An unspecified vulnerability exists when Apache Tomcat is used. The XSL Content portlet allows remote attackers to execute arbitrary commands via unknown vectors.
(CVE-2011-1571)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Liferay Portal 6.0.6 or later.

See Also

https://www.openwall.com/lists/oss-security/2011/03/29/1

http://www.nessus.org/u?7bdf9956

https://issues.liferay.com/browse/LPS-11506

https://issues.liferay.com/browse/LPS-12628

https://issues.liferay.com/browse/LPS-13250

https://issues.liferay.com/browse/LPS-14726

https://issues.liferay.com/browse/LPS-14927

http://xhe.myxwiki.org/xwiki/bin/view/XSLT/Application_Liferay

Plugin Details

Severity: High

ID: 59230

File Name: liferay_6_0_6.nasl

Version: 1.14

Type: remote

Family: CGI abuses

Published: 5/22/2012

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2011-1571

Vulnerability Information

CPE: cpe:/a:liferay:portal

Required KB Items: www/liferay_portal

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/29/2011

Vulnerability Publication Date: 3/29/2011

Reference Information

CVE: CVE-2011-1502, CVE-2011-1503, CVE-2011-1504, CVE-2011-1570, CVE-2011-1571

BID: 47082, 73497

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990