CVE-2024-25148: Liferay Portal vulnerable to user impersonation
8.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.58117%
CWE
Published
2/8/2024
Updated
10/2/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| com.liferay.portal:release.portal.bom | maven | >= 7.2.0, < 7.4.2 | 7.4.2 |
| com.liferay.portal:release.dxp.bom | maven | >= 7.2.0, < 7.2.10.fp15 | 7.2.10.fp15 |
| com.liferay.portal:release.dxp.bom | maven | >= 7.3.0, < 7.3.10.u4 | 7.3.10.u4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper handling of the 'doAsUserId' parameter during URL generation in content creation workflows. The WYSIWYG editor's link insertion mechanism would logically reuse the current request context (including sensitive parameters) unless explicitly sanitized. This matches the CWE-201 pattern (inserting sensitive data into sent content) and aligns with Liferay's patch focus on parameter filtering in editor components. While exact function names aren't disclosed, the architectural pattern implies vulnerable URL generation logic in editor utilities.