René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

124 lines
4.0 KiB
JSON

{
"id": "CVE-2022-42113",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-10-18T21:15:16.247",
"lastModified": "2022-10-20T18:34:50.663",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A Cross-site scripting (XSS) vulnerability in Document Library module in Liferay Portal 7.4.3.30 through 7.4.3.36, and Liferay DXP 7.4 update 30 through update 36 allows remote attackers to inject arbitrary web script or HTML via the `redirect` parameter."
},
{
"lang": "es",
"value": "Una vulnerabilidad de tipo cross-site scripting (XSS) en el m\u00f3dulo Document Library de Liferay Portal versiones 7.4.3.30 hasta 7.4.3.36, y Liferay DXP versiones 7.4 update 30 hasta update 36, permite a atacantes remotos inyectar script web o HTML arbitrarios por medio del par\u00e1metro \"redirect\""
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:dxp:7.4:update_30:*:*:*:*:*:*",
"matchCriteriaId": "D372D9B9-5A83-4FF8-8DE5-617D99D1A8B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:dxp:7.4:update_31:*:*:*:*:*:*",
"matchCriteriaId": "7519ABB1-57A7-46F1-97FC-DD44787F2B6E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:dxp:7.4:update_32:*:*:*:*:*:*",
"matchCriteriaId": "87BD916B-245C-4D62-B595-1985784C2ABC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:dxp:7.4:update_33:*:*:*:*:*:*",
"matchCriteriaId": "841E15A8-0819-4E48-B7E3-3ACCB4C1F43B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:dxp:7.4:update_34:*:*:*:*:*:*",
"matchCriteriaId": "91A243D9-7633-4836-B72D-75EF6C0F8876"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:dxp:7.4:update_35:*:*:*:*:*:*",
"matchCriteriaId": "6E2B1876-78B1-407A-9392-94FFF33AC803"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:dxp:7.4:update_36:*:*:*:*:*:*",
"matchCriteriaId": "4C6BBDC0-9D68-4653-9177-E49B847B04ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.3.30",
"versionEndExcluding": "7.4.3.37",
"matchCriteriaId": "C4595361-88D2-42D7-8B52-295572A474E4"
}
]
}
]
}
],
"references": [
{
"url": "http://liferay.com",
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42113",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}