CVE-2022-42124:
Inefficient Regular Expression Complexity in Liferay Portal
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.62493%
CWE
Published
11/15/2022
Updated
8/17/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
com.liferay.portal:release.portal.bom | maven | >= 7.3.2, < 7.4.3.5 | 7.4.3.5 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability manifests in layout prototype name processing during upgrade operations. While the exact code changes are unavailable, multiple authoritative sources:
- Explicitly name LayoutPageTemplateEntryUpgradeProcess as the vulnerable component
- Indicate the attack vector is through the 'name' field processing
- Specify the CWE-1333 pattern of regex inefficiency
In Java upgrade processes, the entry point is typically an upgrade() method in a VersionUpgradeProcess subclass. The combination of:
- Class name matching advisory references
- Upgrade context handling user-controllable data
- ReDoS vulnerability pattern strongly indicates the upgrade method in this class is where the vulnerable regex processing occurred prior to patching.