First published: Mon Sep 09 2019(Updated: )
Liferay Portal through 7.2.0 GA1 allows XSS via a journal article title to `journal_article/page.jsp` in `journal/journal-taglib`.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Liferay 7.4 GA | <7.2.0 | |
Liferay 7.4 GA | =7.2.0-alpha1 | |
Liferay 7.4 GA | =7.2.0-beta1 | |
Liferay 7.4 GA | =7.2.0-beta2 | |
Liferay 7.4 GA | =7.2.0-beta3 | |
Liferay 7.4 GA | =7.2.0-ga1 | |
Liferay 7.4 GA | =7.2.0-milestone2 | |
Liferay 7.4 GA | =7.2.0-rc2 | |
Liferay 7.4 GA | =7.2.0-rc3 | |
maven/com.liferay:com.liferay.journal.taglib | <3.0.4 | 3.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-16147 has been assigned a moderate severity rating due to its potential for cross-site scripting (XSS) attacks.
To mitigate CVE-2019-16147, update Liferay Portal to a version higher than 7.2.0 GA1.
CVE-2019-16147 affects Liferay Portal versions up to 7.2.0 GA1 and includes various alpha, beta, and release candidates.
CVE-2019-16147 is a cross-site scripting (XSS) vulnerability that allows attackers to inject malicious scripts through journal article titles.
Yes, exploiting CVE-2019-16147 through XSS can potentially lead to unauthorized access to user data and session hijacking.