First published: Wed Jun 10 2020(Updated: )
In Liferay Portal before 7.3.2 and Liferay DXP 7.0 before fix pack 92, 7.1 before fix pack 18, and 7.2 before fix pack 6, the template API does not restrict user access to sensitive objects, which allows remote authenticated users to execute arbitrary code via crafted FreeMarker and Velocity templates.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Liferay 7.4 GA | =7.1-ga1 | |
Liferay 7.4 GA | =7.1-ga2 | |
Liferay 7.4 GA | =7.1-ga3 | |
Liferay 7.4 GA | =7.1.1-ga2 | |
Liferay 7.4 GA | =7.2-ga1 | |
Liferay 7.4 GA | =7.3-ga1 | |
Liferay 7.4 GA | =7.3-ga2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13445 is rated as high severity due to its ability to allow unauthorized access and remote code execution.
To fix CVE-2020-13445, upgrade to Liferay Portal version 7.3.2 or Liferay DXP 7.0 fix pack 92 or later.
CVE-2020-13445 affects users of Liferay Portal versions prior to 7.3.2 and various earlier fix packs for versions 7.0, 7.1, and 7.2.
CVE-2020-13445 can be exploited by authenticated remote users to execute arbitrary code using specially crafted FreeMarker and Velocity templates.
There are no official workarounds for CVE-2020-13445, and upgrading to the fixed versions is recommended.