First published: Mon Jun 03 2019(Updated: )
In Liferay Portal before 7.1 CE GA4, an XSS vulnerability exists in the SimpleCaptcha API when custom code passes unsanitized input into the "url" parameter of the JSP taglib call <liferay-ui:captcha url="<%= url %>" /> or <liferay-captcha:captcha url="<%= url %>" />. Liferay Portal out-of-the-box behavior with no customizations is not vulnerable.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Liferay 7.4 GA | <=6.0.6 | |
Liferay 7.4 GA | =6.1.0-b1 | |
Liferay 7.4 GA | =6.1.0-b2 | |
Liferay 7.4 GA | =6.1.0-b3 | |
Liferay 7.4 GA | =6.1.0-b4 | |
Liferay 7.4 GA | =6.1.0-ga1 | |
Liferay 7.4 GA | =6.1.0-rc1 | |
Liferay 7.4 GA | =6.1.1-ga2 | |
Liferay 7.4 GA | =6.1.2-ga3 | |
Liferay 7.4 GA | =6.2.0-b1 | |
Liferay 7.4 GA | =6.2.0-b2 | |
Liferay 7.4 GA | =6.2.0-ga1 | |
Liferay 7.4 GA | =6.2.0-m1 | |
Liferay 7.4 GA | =6.2.0-m2 | |
Liferay 7.4 GA | =6.2.0-m3 | |
Liferay 7.4 GA | =6.2.0-m4 | |
Liferay 7.4 GA | =6.2.0-m5 | |
Liferay 7.4 GA | =6.2.0-m6 | |
Liferay 7.4 GA | =6.2.0-rc1 | |
Liferay 7.4 GA | =6.2.0-rc2 | |
Liferay 7.4 GA | =6.2.0-rc3 | |
Liferay 7.4 GA | =6.2.0-rc4 | |
Liferay 7.4 GA | =6.2.0-rc5 | |
Liferay 7.4 GA | =6.2.0-rc6 | |
Liferay 7.4 GA | =6.2.1-ga2 | |
Liferay 7.4 GA | =6.2.2-ga3 | |
Liferay 7.4 GA | =6.2.3-ga4 | |
Liferay 7.4 GA | =6.2.4-ga5 | |
Liferay 7.4 GA | =6.2.5-ga6 | |
Liferay 7.4 GA | =7.0.0-a1 | |
Liferay 7.4 GA | =7.0.0-a2 | |
Liferay 7.4 GA | =7.0.0-a3 | |
Liferay 7.4 GA | =7.0.0-a4 | |
Liferay 7.4 GA | =7.0.0-a5 | |
Liferay 7.4 GA | =7.0.0-b1 | |
Liferay 7.4 GA | =7.0.0-b2 | |
Liferay 7.4 GA | =7.0.0-b3 | |
Liferay 7.4 GA | =7.0.0-b4 | |
Liferay 7.4 GA | =7.0.0-b5 | |
Liferay 7.4 GA | =7.0.0-b6 | |
Liferay 7.4 GA | =7.0.0-b7 | |
Liferay 7.4 GA | =7.0.0-ga1 | |
Liferay 7.4 GA | =7.0.0-m1 | |
Liferay 7.4 GA | =7.0.0-m2 | |
Liferay 7.4 GA | =7.0.0-m3 | |
Liferay 7.4 GA | =7.0.0-m4 | |
Liferay 7.4 GA | =7.0.0-m5 | |
Liferay 7.4 GA | =7.0.0-m6 | |
Liferay 7.4 GA | =7.0.0-m7 | |
Liferay 7.4 GA | =7.0.1-ga2 | |
Liferay 7.4 GA | =7.0.2-ga3 | |
Liferay 7.4 GA | =7.0.3-ga4 | |
Liferay 7.4 GA | =7.0.4-ga5 | |
Liferay 7.4 GA | =7.0.5-ga6 | |
Liferay 7.4 GA | =7.0.6-ga7 | |
Liferay 7.4 GA | =7.1.0-a1 | |
Liferay 7.4 GA | =7.1.0-a2 | |
Liferay 7.4 GA | =7.1.0-b1 | |
Liferay 7.4 GA | =7.1.0-b2 | |
Liferay 7.4 GA | =7.1.0-b3 | |
Liferay 7.4 GA | =7.1.0-ga1 | |
Liferay 7.4 GA | =7.1.0-m1 | |
Liferay 7.4 GA | =7.1.0-m2 | |
Liferay 7.4 GA | =7.1.0-rc1 | |
maven/com.liferay.portal:release.portal.bom | <7.1.0 | 7.1.0 |
<=6.0.6 | ||
=6.1.0-b1 | ||
=6.1.0-b2 | ||
=6.1.0-b3 | ||
=6.1.0-b4 | ||
=6.1.0-ga1 | ||
=6.1.0-rc1 | ||
=6.1.1-ga2 | ||
=6.1.2-ga3 | ||
=6.2.0-b1 | ||
=6.2.0-b2 | ||
=6.2.0-ga1 | ||
=6.2.0-m1 | ||
=6.2.0-m2 | ||
=6.2.0-m3 | ||
=6.2.0-m4 | ||
=6.2.0-m5 | ||
=6.2.0-m6 | ||
=6.2.0-rc1 | ||
=6.2.0-rc2 | ||
=6.2.0-rc3 | ||
=6.2.0-rc4 | ||
=6.2.0-rc5 | ||
=6.2.0-rc6 | ||
=6.2.1-ga2 | ||
=6.2.2-ga3 | ||
=6.2.3-ga4 | ||
=6.2.4-ga5 | ||
=6.2.5-ga6 | ||
=7.0.0-a1 | ||
=7.0.0-a2 | ||
=7.0.0-a3 | ||
=7.0.0-a4 | ||
=7.0.0-a5 | ||
=7.0.0-b1 | ||
=7.0.0-b2 | ||
=7.0.0-b3 | ||
=7.0.0-b4 | ||
=7.0.0-b5 | ||
=7.0.0-b6 | ||
=7.0.0-b7 | ||
=7.0.0-ga1 | ||
=7.0.0-m1 | ||
=7.0.0-m2 | ||
=7.0.0-m3 | ||
=7.0.0-m4 | ||
=7.0.0-m5 | ||
=7.0.0-m6 | ||
=7.0.0-m7 | ||
=7.0.1-ga2 | ||
=7.0.2-ga3 | ||
=7.0.3-ga4 | ||
=7.0.4-ga5 | ||
=7.0.5-ga6 | ||
=7.0.6-ga7 | ||
=7.1.0-a1 | ||
=7.1.0-a2 | ||
=7.1.0-b1 | ||
=7.1.0-b2 | ||
=7.1.0-b3 | ||
=7.1.0-ga1 | ||
=7.1.0-m1 | ||
=7.1.0-m2 | ||
=7.1.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-6588 has been classified as a medium severity XSS vulnerability.
To mitigate CVE-2019-6588, ensure that you sanitize all inputs passed to the SimpleCaptcha API's 'url' parameter.
CVE-2019-6588 affects Liferay Portal versions prior to 7.1 CE GA4.
As of now, specific exploits for CVE-2019-6588 have not been publicly disclosed.
Exploitation of CVE-2019-6588 could allow attackers to execute malicious scripts in the context of the user's session.