CVE-2022-42129:
Authorization Bypass in Liferay Portal
4.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.36544%
CWE
Published
11/15/2022
Updated
2/1/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
com.liferay.portal:release.portal.bom | maven | >= 7.3.2, < 7.4.3.5 | 7.4.3.5 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability centers around improper authorization checks when accessing form entries via formInstanceRecordId. Based on Liferay's architecture:
- Service layer functions (DDMFormInstanceRecordServiceImpl) would handle data access logic
- Controller endpoints (DDMFormInstanceRecordController) would process HTTP parameters
- The CWE-639 pattern matches direct object reference without authorization checks
- Dynamic Data Mapping module structure suggests these are core components handling form entries While no patch code is available, the parameter name (formInstanceRecordId) and module details indicate these functions would be involved in processing vulnerable requests. Confidence is medium due to lack of direct patch evidence but strong correlation with vulnerability characteristics.