cve/2023/CVE-2023-42497.md

20 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-42497](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42497)
![](https://img.shields.io/static/v1?label=Product&message=DXP&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Portal&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=7.4.13%3C%3D%207.4.13.u85%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=7.4.3.4%3C%3D%207.4.3.85%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen)
### Description
Reflected cross-site scripting (XSS) vulnerability on the Export for Translation page in Liferay Portal 7.4.3.4 through 7.4.3.85, and Liferay DXP 7.4 before update 86 allows remote attackers to inject arbitrary web script or HTML via the `_com_liferay_translation_web_internal_portlet_TranslationPortlet_redirect` parameter.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds