#VU8542 Code injection in Liferay Enterprise Portal


Published: 2017-01-13 | Updated: 2017-09-21

Vulnerability identifier: #VU8542

Vulnerability risk: Medium

CVSSv3.1: 8.6 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2010-5327

CWE-ID: CWE-94

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Liferay Enterprise Portal
Web applications / CMS

Vendor: Liferay

Description

The vulnerability allows a remote authenticated attacker to execute arbitrary OS commands.

The vulnerability exists due to improper input sanitization in Velocity templates. A remote authenticated attacker can execute arbitrary shell commands via specially crafted Velocity template.

Mitigation
Update to version 6.2 CE GA6 (6.2.5).

Vulnerable software versions

Liferay Enterprise Portal: 6.2.0 B1 - 6.2.4 GA5


External links
http://issues.liferay.com/browse/LPS-64547


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability