CVE-2020-7961:
Deserialization of Untrusted Data in Liferay Portal
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.99974%
CWE
Published
5/24/2022
Updated
8/28/2024
KEV Status
Yes
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
com.liferay.portal:com.liferay.portal.kernel | maven | < 4.35.3 | 4.35.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability (CVE-2020-7961) stems from insecure deserialization in Liferay's JSON web services (JSONWS) endpoint. The core issue lies in how JSON input is converted to Java objects during web service invocation. These two functions are central to the JSONWS request handling process:
- JSONWebServiceActionParameters.getParameterValue handles parameter desarshalling
- JSONWebServiceActionImpl.execute processes the entire request In vulnerable versions, they allowed deserialization of arbitrary classes via the JSON input, including attacker-controlled gadget chains. The first patched version (7.2.1 CE GA2) likely added validation/type restrictions in these components.