First published: Tue Nov 15 2022(Updated: )
ReDoS vulnerability in LayoutPageTemplateEntryUpgradeProcess in Liferay Portal 7.3.2 through 7.4.3.4 and Liferay DXP 7.2 fix pack 9 through fix pack 18, 7.3 before update 4, and DXP 7.4 GA allows remote attackers to consume an excessive amount of server resources via a crafted payload injected into the 'name' field of a layout prototype.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Liferay Digital Experience Platform | =7.2-fix_pack_10 | |
Liferay Digital Experience Platform | =7.2-fix_pack_11 | |
Liferay Digital Experience Platform | =7.2-fix_pack_12 | |
Liferay Digital Experience Platform | =7.2-fix_pack_13 | |
Liferay Digital Experience Platform | =7.2-fix_pack_14 | |
Liferay Digital Experience Platform | =7.2-fix_pack_15 | |
Liferay Digital Experience Platform | =7.2-fix_pack_16 | |
Liferay Digital Experience Platform | =7.2-fix_pack_9 | |
Liferay Digital Experience Platform | =7.3 | |
Liferay Digital Experience Platform | =7.4 | |
Liferay Liferay Portal | >=7.3.2<7.4.3.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-42124.
The severity of CVE-2022-42124 is high with a severity value of 7.5.
CVE-2022-42124 affects Liferay Portal versions 7.3.2 through 7.4.3.4 and Liferay DXP versions 7.2 fix pack 9 through fix pack 18, 7.3 before update 4, and DXP 7.4 GA.
A remote attacker can exploit CVE-2022-42124 by injecting a crafted payload into Liferay Portal, consuming an excessive amount of server resources.
To fix CVE-2022-42124, update to Liferay Portal version 7.4.3.5 or higher.