First published: Wed Feb 21 2024(Updated: )
Stored cross-site scripting (XSS) vulnerability in the Document and Media widget in Liferay Portal 7.4.3.18 through 7.4.3.101, and Liferay DXP 2023.Q3 before patch 6, and 7.4 update 18 through 92 allows remote authenticated users to inject arbitrary web script or HTML via a crafted payload injected into a document's “Title” text field.
Credit: security@liferay.com security@liferay.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/com.liferay.portal:release.dxp.bom | >=7.4.13.u18<=7.4.13.u92 | 2023.Q3.6 |
maven/com.liferay.portal:release.dxp.bom | >=2023.Q3<2023.Q3.6 | 2023.Q3.6 |
maven/com.liferay.portal:release.portal.bom | >=7.4.3.18<=7.4.3.101 | |
maven/com.liferay.portal:release.dxp.bom | >=7.4.13.u18<=7.4.13.u92 | |
maven/com.liferay.portal:release.portal.bom | >=7.4.3.18<=7.4.3.101 | 7.4.3.102 |
Liferay 7.4 GA | >=7.4.3.18<7.4.3.102 | |
Liferay DXP | =7.4-update18 | |
Liferay DXP | =7.4-update19 | |
Liferay DXP | =7.4-update20 | |
Liferay DXP | =7.4-update21 | |
Liferay DXP | =7.4-update22 | |
Liferay DXP | =7.4-update23 | |
Liferay DXP | =7.4-update24 | |
Liferay DXP | =7.4-update25 | |
Liferay DXP | =7.4-update26 | |
Liferay DXP | =7.4-update27 | |
Liferay DXP | =7.4-update28 | |
Liferay DXP | =7.4-update29 | |
Liferay DXP | =7.4-update30 | |
Liferay DXP | =7.4-update31 | |
Liferay DXP | =7.4-update32 | |
Liferay DXP | =7.4-update33 | |
Liferay DXP | =7.4-update34 | |
Liferay DXP | =7.4-update35 | |
Liferay DXP | =7.4-update36 | |
Liferay DXP | =7.4-update37 | |
Liferay DXP | =7.4-update38 | |
Liferay DXP | =7.4-update39 | |
Liferay DXP | =7.4-update40 | |
Liferay DXP | =7.4-update41 | |
Liferay DXP | =7.4-update42 | |
Liferay DXP | =7.4-update43 | |
Liferay DXP | =7.4-update44 | |
Liferay DXP | =7.4-update45 | |
Liferay DXP | =7.4-update46 | |
Liferay DXP | =7.4-update47 | |
Liferay DXP | =7.4-update48 | |
Liferay DXP | =7.4-update49 | |
Liferay DXP | =7.4-update50 | |
Liferay DXP | =7.4-update51 | |
Liferay DXP | =7.4-update52 | |
Liferay DXP | =7.4-update53 | |
Liferay DXP | =7.4-update54 | |
Liferay DXP | =7.4-update55 | |
Liferay DXP | =7.4-update56 | |
Liferay DXP | =7.4-update57 | |
Liferay DXP | =7.4-update58 | |
Liferay DXP | =7.4-update59 | |
Liferay DXP | =7.4-update60 | |
Liferay DXP | =7.4-update61 | |
Liferay DXP | =7.4-update62 | |
Liferay DXP | =7.4-update63 | |
Liferay DXP | =7.4-update64 | |
Liferay DXP | =7.4-update65 | |
Liferay DXP | =7.4-update66 | |
Liferay DXP | =7.4-update67 | |
Liferay DXP | =7.4-update68 | |
Liferay DXP | =7.4-update69 | |
Liferay DXP | =7.4-update70 | |
Liferay DXP | =7.4-update71 | |
Liferay DXP | =7.4-update72 | |
Liferay DXP | =7.4-update73 | |
Liferay DXP | =7.4-update74 | |
Liferay DXP | =7.4-update75 | |
Liferay DXP | =7.4-update76 | |
Liferay DXP | =7.4-update77 | |
Liferay DXP | =7.4-update78 | |
Liferay DXP | =7.4-update79 | |
Liferay DXP | =7.4-update80 | |
Liferay DXP | =7.4-update81 | |
Liferay DXP | =7.4-update82 | |
Liferay DXP | =7.4-update83 | |
Liferay DXP | =7.4-update84 | |
Liferay DXP | =7.4-update85 | |
Liferay DXP | =7.4-update86 | |
Liferay DXP | =7.4-update87 | |
Liferay DXP | =7.4-update88 | |
Liferay DXP | =7.4-update89 | |
Liferay DXP | =7.4-update90 | |
Liferay DXP | =7.4-update91 | |
Liferay DXP | =7.4-update92 | |
Liferay DXP | =2023.q3.0 | |
Liferay DXP | =2023.q3.1 | |
Liferay DXP | =2023.q3.2 | |
Liferay DXP | =2023.q3.3 | |
Liferay DXP | =2023.q3.4 | |
Liferay DXP | =2023.q3.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-47795 is classified as a stored cross-site scripting (XSS) vulnerability.
To fix CVE-2023-47795, update to Liferay Portal versions 7.4.3.102 or later and Liferay DXP version 2023.Q3.6 or later.
CVE-2023-47795 affects Liferay Portal versions from 7.4.3.18 to 7.4.3.101 and Liferay DXP version 2023.Q3 before patch 6.
CVE-2023-47795 can be exploited by remote authenticated users to inject arbitrary web scripts or HTML.
The impact of CVE-2023-47795 includes unauthorized script execution which could lead to data theft or session hijacking.