cve/2024/CVE-2024-26270.md
2024-05-25 21:48:12 +02:00

20 lines
1019 B
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2024-26270](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26270)
![](https://img.shields.io/static/v1?label=Product&message=DXP&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Portal&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=2023.q3.1%3C%3D%202023.q3.4%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=7.4.3.76%3C%3D%207.4.3.99%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data&color=brighgreen)
### Description
The Account Settings page in Liferay Portal 7.4.3.76 through 7.4.3.99, and Liferay DXP 2023.Q3 before patch 5, and 7.4 update 76 through 92 embeds the users hashed password in the pages HTML source, which allows man-in-the-middle attackers to steal a user's hashed password.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds