The vulnerability is a stored Cross-Site Scripting (XSS) issue in Liferay Portal's user sites administration page. The provided patch b230afddd5125dc5f858d68011ef93e9c47703a6 clearly shows the fix in the modules/apps/users-admin/users-admin-web/src/main/resources/META-INF/resources/user/sites.jsp file.
The vulnerability lies in a JavaScript code block within this JSP file. Specifically, the groupdescriptivename of a selected site was being assigned to the entityName variable and then used to create a UI label without any sanitization. This allows an attacker with privileges to create or edit organization site names to inject a malicious script. When another user (e.g., an administrator) manages user sites and selects the maliciously crafted site, the script would execute in their browser.
The patch addresses this by wrapping the selectedItem.groupdescriptivename in an A.Escape.html() call, which properly escapes the HTML and prevents the script from being executed.
Since the vulnerability is within a JSP file, a Java profiler would trace the execution to the servlet generated from this JSP. The standard naming convention for JSPs compiled by Jasper (Tomcat's JSP engine) creates a class name based on the file path, and the main method that handles the request is _jspService. Therefore, org.apache.jsp.user.sites_jsp._jspService is the most precise representation of the vulnerable component that would appear in a Java runtime profile.