Miggo Logo

CVE-2022-42127:
Incorrect Default Permissions in Liferay Portal

5.3

CVSS Score

Basic Information

EPSS Score
-
Published
11/15/2022
Updated
2/1/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
com.liferay.portal:release.portal.bommaven>= 7.4.3.5, <= 7.4.3.367.4.3.48

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from missing permission checks in the Friendly URL module's history retrieval functionality. Analysis focused on:

  1. Core data access methods in the service layer that would return historical URL entries
  2. Web layer entry points that handle user requests for URL history While no patch code is available, Liferay's architecture patterns suggest these components would require permission checks (likely added via PermissionChecker.hasPermission() calls in fixed versions). The medium confidence reflects educated inference based on vulnerability patterns in Liferay's permission system and module structure.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** *ri*n*ly Url mo*ul* in Li**r*y Port*l *.*.*.* t*rou** *.*.*.**, *n* Li**r*y *XP *.* up**t* * t*ou** ** *o*s not prop*rly ****k us*r p*rmissions, w*i** *llows r*mot* *tt**k*rs to o*t*in t** *istory o* *ll *ri*n*ly URLs t**t w*s *ssi*n** to * p***.

Reasoning

T** vuln*r**ility st*ms *rom missin* p*rmission ****ks in t** *ri*n*ly URL mo*ul*'s *istory r*tri*v*l *un*tion*lity. *n*lysis *o*us** on: *. *or* **t* ****ss m*t*o*s in t** s*rvi** l*y*r t**t woul* r*turn *istori**l URL *ntri*s *. W** l*y*r *ntry poi