Miggo Logo

CVE-2022-42124:
Inefficient Regular Expression Complexity in Liferay Portal

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.62493%
Published
11/15/2022
Updated
8/17/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
com.liferay.portal:release.portal.bommaven>= 7.3.2, < 7.4.3.57.4.3.5

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability manifests in layout prototype name processing during upgrade operations. While the exact code changes are unavailable, multiple authoritative sources:

  1. Explicitly name LayoutPageTemplateEntryUpgradeProcess as the vulnerable component
  2. Indicate the attack vector is through the 'name' field processing
  3. Specify the CWE-1333 pattern of regex inefficiency

In Java upgrade processes, the entry point is typically an upgrade() method in a VersionUpgradeProcess subclass. The combination of:

  • Class name matching advisory references
  • Upgrade context handling user-controllable data
  • ReDoS vulnerability pattern strongly indicates the upgrade method in this class is where the vulnerable regex processing occurred prior to patching.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

R**oS vuln*r**ility in L*youtP***T*mpl*t**ntryUp*r***Pro**ss in Li**r*y Port*l *.*.* t*rou** *.*.*.* *n* Li**r*y *XP *.* *ix p**k * t*rou** *ix p**k **, *.* ***or* up**t* *, *n* *XP *.* ** *llows r*mot* *tt**k*rs to *onsum* *n *x**ssiv* *mount o* s*r

Reasoning

T** vuln*r**ility m*ni**sts in l*yout prototyp* n*m* pro**ssin* *urin* up*r*** op*r*tions. W*il* t** *x**t *o** ***n**s *r* un*v*il**l*, multipl* *ut*orit*tiv* sour**s: *. *xpli*itly n*m* L*youtP***T*mpl*t**ntryUp*r***Pro**ss *s t** vuln*r**l* *ompon