First published: Wed Jun 10 2020(Updated: )
Liferay Portal 7.x before 7.3.2, and Liferay DXP 7.0 before fix pack 92, 7.1 before fix pack 18, and 7.2 before fix pack 5 does not sanitize the information returned by the DDMDataProvider API, which allows remote authenticated users to obtain the password to REST Data Providers.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Liferay 7.4 GA | =7.1-ga1 | |
Liferay 7.4 GA | =7.1-ga2 | |
Liferay 7.4 GA | =7.1-ga3 | |
Liferay 7.4 GA | =7.1.1-ga2 | |
Liferay 7.4 GA | =7.2-ga1 | |
Liferay 7.4 GA | =7.3-ga1 | |
Liferay 7.4 GA | =7.3-ga2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-13444 is considered medium due to the potential exposure of sensitive information.
To fix CVE-2020-13444, update Liferay Portal to version 7.3.2 or later or apply the necessary fix packs for Liferay DXP as specified.
CVE-2020-13444 is associated with authenticated remote access attacks that exploit improperly sanitized data.
CVE-2020-13444 affects Liferay Portal 7.x versions before 7.3.2 and various specific fix pack versions of Liferay DXP.
Attackers can use CVE-2020-13444 to retrieve sensitive information, specifically passwords for REST Data Providers, from the DDMDataProvider API.