Miggo Logo

CVE-2024-25148: Liferay Portal vulnerable to user impersonation

8.1

CVSS Score
3.1

Basic Information

EPSS Score
0.58117%
Published
2/8/2024
Updated
10/2/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
com.liferay.portal:release.portal.bommaven>= 7.2.0, < 7.4.27.4.2
com.liferay.portal:release.dxp.bommaven>= 7.2.0, < 7.2.10.fp157.2.10.fp15
com.liferay.portal:release.dxp.bommaven>= 7.3.0, < 7.3.10.u47.3.10.u4

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper handling of the 'doAsUserId' parameter during URL generation in content creation workflows. The WYSIWYG editor's link insertion mechanism would logically reuse the current request context (including sensitive parameters) unless explicitly sanitized. This matches the CWE-201 pattern (inserting sensitive data into sent content) and aligns with Liferay's patch focus on parameter filtering in editor components. While exact function names aren't disclosed, the architectural pattern implies vulnerable URL generation logic in editor utilities.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

In Li**r*y Port*l *.*.* t*rou** *.*.*, *n* ol**r unsupport** v*rsions, *n* Li**r*y *XP *.* ***or* s*rvi** p**k *, *.* ***or* *ix p**k **, *n* ol**r unsupport** v*rsions t** `*o*sUs*rI*` URL p*r*m*t*r m*y **t l**k** w**n *r**tin* link** *ont*nt usin*

Reasoning

T** vuln*r**ility st*ms *rom improp*r **n*lin* o* t** '*o*sUs*rI*' p*r*m*t*r *urin* URL **n*r*tion in *ont*nt *r**tion work*lows. T** WYSIWY* **itor's link ins*rtion m****nism woul* lo*i**lly r*us* t** *urr*nt r*qu*st *ont*xt (in*lu*in* s*nsitiv* p*r