Miggo Logo

CVE-2024-26270: Liferay Portal and Liferay DXP vulnerable to theft of hashed password

6.5

CVSS Score
3.1

Basic Information

EPSS Score
0.39717%
Published
2/20/2024
Updated
1/28/2025
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
com.liferay.portal:release.portal.bommaven>= 7.4.3.76, < 7.4.3.1007.4.3.100
com.liferay.portal:release.dxp.bommaven>= 2023.Q3, < 2023.Q3.52023.Q3.5
com.liferay.portal:release.dxp.bommaven>= 7.4.0, <= 7.4.13.u92

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the Account Settings page embedding hashed passwords in HTML output. In Liferay's architecture:

  1. Portlet render methods (like AccountSettingsPortlet.render) typically prepare data for display
  2. JSP files (like view.jsp) handle HTML generation
  3. The CWE-201 classification indicates sensitive data insertion during response generation
  4. The MITM attack vector implies client-side exposure of the hash While exact code isn't available, Liferay's modular structure and vulnerability pattern strongly suggest these components are responsible for improperly exposing the password hash during page rendering.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** ***ount S*ttin*s p*** in Li**r*y Port*l *.*.*.** t*rou** *.*.*.**, *n* Li**r*y *XP ****.Q* ***or* p*t** *, *n* *.* up**t* ** t*rou** ** *m***s t** us*r’s **s*** p*sswor* in t** p***’s *TML sour**, w*i** *llows m*n-in-t**-mi**l* *tt**k*rs to st**l

Reasoning

T** vuln*r**ility st*ms *rom t** ***ount S*ttin*s p*** *m****in* **s*** p*sswor*s in *TML output. In Li**r*y's *r**it**tur*: *. Portl*t r*n**r m*t*o*s (lik* ***ountS*ttin*sPortl*t.r*n**r) typi**lly pr*p*r* **t* *or *ispl*y *. JSP *il*s (lik* vi*w.jsp