First published: Tue Jan 28 2020(Updated: )
In LifeRay Portal CE 7.1.0 through 7.2.1 GA2, the First Name, Middle Name, and Last Name fields for user accounts in MyAccountPortlet are all vulnerable to a persistent XSS issue. Any user can modify these fields with a particular XSS payload, and it will be stored in the database. The payload will then be rendered when a user utilizes the search feature to search for other users (i.e., if a user with modified fields occurs in the search results). This issue was fixed in Liferay Portal CE version 7.3.0 GA1.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Liferay 7.4 GA | >=7.1.0<=7.2.1 | |
maven/com.liferay.portal:release.portal.bom | >=7.1.0<=7.2.1 | 7.3.0 |
>=7.1.0<=7.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7934 has a high severity rating due to its exploitation potential for persistent cross-site scripting (XSS) attacks.
To fix CVE-2020-7934, update your Liferay Portal to the latest version that addresses this vulnerability.
CVE-2020-7934 affects Liferay Portal Community Edition versions 7.1.0 through 7.2.1 GA2.
Yes, CVE-2020-7934 can be exploited by authenticated users who can modify the First Name, Middle Name, and Last Name fields.
Exploiting CVE-2020-7934 could lead to unauthorized script execution in the context of other users' sessions, which may result in data theft or manipulation.