First published: Sat May 07 2011(Updated: )
The XSL Content portlet in Liferay Portal Community Edition (CE) 5.x and 6.x before 6.0.6 GA, when Apache Tomcat or Oracle GlassFish is used, allows remote authenticated users to read arbitrary (1) XSL and (2) XML files via a file:/// URL.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Liferay 7.4 GA | >=5.1.0<=5.1.2 | |
Liferay 7.4 GA | >=5.2.0<=5.2.3 | |
Liferay 7.4 GA | >=6.0.0<=6.0.5 | |
Linux Kernel | ||
Microsoft Windows 7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1503 is considered a high-severity vulnerability due to its potential to allow unauthorized access to sensitive files.
To fix CVE-2011-1503, upgrade Liferay Portal Community Edition to version 6.0.6 GA or higher.
CVE-2011-1503 affects users of Liferay Portal Community Edition versions 5.x and 6.x prior to 6.0.6 GA when using Apache Tomcat or Oracle GlassFish.
CVE-2011-1503 allows remote authenticated users to read arbitrary XSL and XML files.
Yes, CVE-2011-1503 remains a concern for users running affected versions of Liferay Portal without applying the necessary updates.