First published: Wed May 24 2023(Updated: )
In Liferay Portal 7.3.0 and earlier, and Liferay DXP 7.2 and earlier the default configuration does not require users to verify their email address, which allows remote attackers to create accounts using fake email addresses or email addresses which they don't control. The portal property `company.security.strangers.verify` should be set to true.
Credit: security@liferay.com security@liferay.com
Affected Software | Affected Version | How to fix |
---|---|---|
Liferay Digital Experience Platform | =7.2 | |
Liferay Digital Experience Platform | =7.1 | |
Liferay Digital Experience Platform | =7.0 | |
Liferay Liferay Portal | >=7.0.0<=7.3.0 | |
maven/com.liferay.portal:release.portal.bom | >=7.0.0<7.3.1 | 7.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-33949 is high.
CVE-2023-33949 affects Liferay Portal 7.3.0 and earlier, and Liferay DXP 7.2 and earlier.
The vulnerability in CVE-2023-33949 is that the default configuration of Liferay Portal and Liferay DXP does not require users to verify their email address.
Attackers can create accounts using fake email addresses or email addresses they don't control in CVE-2023-33949.
To fix CVE-2023-33949, update Liferay Portal to version 7.3.1 or later, and Liferay DXP to version 7.2.1 or later.