CVE-2024-26270: Liferay Portal and Liferay DXP vulnerable to theft of hashed password
6.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.39717%
CWE
Published
2/20/2024
Updated
1/28/2025
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| com.liferay.portal:release.portal.bom | maven | >= 7.4.3.76, < 7.4.3.100 | 7.4.3.100 |
| com.liferay.portal:release.dxp.bom | maven | >= 2023.Q3, < 2023.Q3.5 | 2023.Q3.5 |
| com.liferay.portal:release.dxp.bom | maven | >= 7.4.0, <= 7.4.13.u92 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the Account Settings page embedding hashed passwords in HTML output. In Liferay's architecture:
- Portlet render methods (like AccountSettingsPortlet.render) typically prepare data for display
- JSP files (like view.jsp) handle HTML generation
- The CWE-201 classification indicates sensitive data insertion during response generation
- The MITM attack vector implies client-side exposure of the hash While exact code isn't available, Liferay's modular structure and vulnerability pattern strongly suggest these components are responsible for improperly exposing the password hash during page rendering.