cve/2024/CVE-2024-26270.md

20 lines
1019 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2024-26270](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26270)
![](https://img.shields.io/static/v1?label=Product&message=DXP&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Portal&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=2023.q3.1%3C%3D%202023.q3.4%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=7.4.3.76%3C%3D%207.4.3.99%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data&color=brighgreen)
### Description
The Account Settings page in Liferay Portal 7.4.3.76 through 7.4.3.99, and Liferay DXP 2023.Q3 before patch 5, and 7.4 update 76 through 92 embeds the users hashed password in the pages HTML source, which allows man-in-the-middle attackers to steal a user's hashed password.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds