cve/2024/CVE-2024-25610.md
2024-05-25 21:48:12 +02:00

20 lines
1.1 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2024-25610](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25610)
![](https://img.shields.io/static/v1?label=Product&message=DXP&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Portal&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=7.2.0%3C%3D%207.4.3.12%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=7.4.13%3C%3D%207.4.13.u8%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-1188%20Insecure%20Default%20Initialization%20of%20Resource&color=brighgreen)
### Description
In Liferay Portal 7.2.0 through 7.4.3.12, and older unsupported versions, and Liferay DXP 7.4 before update 9, 7.3 before update 4, 7.2 before fix pack 19, and older unsupported versions, the default configuration does not sanitize blog entries of JavaScript, which allows remote authenticated users to inject arbitrary web script or HTML (XSS) via a crafted payload injected into a blog entrys content text field.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds